Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET CVE-2025-24043 WinDbg Remote Code Execution Vulnerability
MicrosoftASP.NET Core & Visual Studio CVE-2025-24070 ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
MicrosoftAzure Agent Installer CVE-2025-21199 Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
MicrosoftAzure Arc CVE-2025-26627 Azure Arc Installer Elevation of Privilege Vulnerability
MicrosoftAzure CLI CVE-2025-24049 Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
MicrosoftAzure PromptFlow CVE-2025-24986 Azure Promptflow Remote Code Execution Vulnerability
MicrosoftKernel Streaming WOW Thunk Service Driver CVE-2025-24995 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
secalert@redhat.comMariner CVE-2021-3672 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21681 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21683 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21692 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21697 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21743 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21707 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21711 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21675 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21694 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21674 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21667 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21669 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21658 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21748 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21652 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21642 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21640 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-58011 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-58017 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-58007 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21670 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21749 Unknown
cve@mitre.orgMariner CVE-2024-56171 Unknown
jordan@liggitt.netMariner CVE-2025-0426 Unknown
cve@mitre.orgMariner CVE-2016-10087 Unknown
security-advisories@github.comMariner CVE-2024-25112 Unknown
security-advisories@github.comMariner CVE-2024-24826 Unknown
cve@mitre.orgMariner CVE-2023-52160 Unknown
cve@mitre.orgMariner CVE-2019-25219 Unknown
security-advisories@github.comMariner CVE-2025-26603 Unknown
cna@vuldb.comMariner CVE-2025-1215 Unknown
cna@python.orgMariner CVE-2025-0938 Unknown
cve@mitre.orgMariner CVE-2024-45492 Unknown
cve@mitre.orgMariner CVE-2024-50602 Unknown
cve@mitre.orgMariner CVE-2024-45490 Unknown
cna@python.orgMariner CVE-2024-4032 Unknown
cna@python.orgMariner CVE-2024-3219 Unknown
security-advisories@github.comMariner CVE-2024-28180 Unknown
security-advisories@github.comMariner CVE-2023-45803 Unknown
cve@mitre.orgMariner CVE-2024-28757 Unknown
openssl-security@openssl.orgMariner CVE-2024-13176 Unknown
cve@mitre.orgMariner CVE-2025-27113 Unknown
cve@mitre.orgMariner CVE-2025-24928 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57996 Unknown
cve@mitre.orgMariner CVE-2020-13435 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21820 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57981 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57933 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57939 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-48875 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-47141 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-6874 Unknown
cve@mitre.orgMariner CVE-2023-48795 Unknown
PSIRT@samsung.comMariner CVE-2025-0633 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-11053 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-0167 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-0665 Unknown
secalert@redhat.comMariner CVE-2023-2455 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-54680 Unknown
cve-coordination@google.comMariner CVE-2023-6817 Unknown
cve@mitre.orgMariner CVE-2024-36623 Unknown
cve@mitre.orgMariner CVE-2024-36621 Unknown
security@golang.orgMariner CVE-2024-45337 Unknown
security-advisories@github.comMariner CVE-2024-43802 Unknown
secalert@redhat.comMariner CVE-2025-26601 Unknown
secalert@redhat.comMariner CVE-2025-26599 Unknown
security-advisories@github.comMariner CVE-2025-27423 Unknown
cve_disclosure@tech.gov.sgMariner CVE-2025-1744 Unknown
secalert@redhat.comMariner CVE-2025-26597 Unknown
secalert@redhat.comMariner CVE-2023-6121 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56582 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56613 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56611 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57926 Unknown
security@opentext.comMariner CVE-2016-9840 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57925 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57916 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57910 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57922 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57908 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57887 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57882 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57801 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56769 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56767 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56719 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56718 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56703 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56663 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56655 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56654 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56653 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56649 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56617 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57973 Unknown
security@opentext.comMariner CVE-2016-9841 Unknown
security-advisories@github.comMariner CVE-2023-25564 Unknown
security@opentext.comMariner CVE-2016-9843 Unknown
security-advisories@github.comMariner CVE-2024-37891 Unknown
openssl-security@openssl.orgMariner CVE-2024-9143 Unknown
openssl-security@openssl.orgMariner CVE-2024-12797 Unknown
psirt@nvidia.comMariner CVE-2025-23359 Unknown
cve@mitre.orgMariner CVE-2024-25062 Unknown
security@openanolis.orgMariner CVE-2025-1390 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21814 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21745 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21744 Unknown
cna@python.orgMariner CVE-2024-4030 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21742 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21736 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21735 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21699 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21690 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21687 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21689 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21684 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21676 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21673 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21741 Unknown
cve@mitre.orgMariner CVE-2024-45491 Unknown
security-advisories@github.comMariner CVE-2023-44398 Unknown
security-advisories@github.comMariner CVE-2024-39695 Unknown
cve@mitre.orgMariner CVE-2024-34402 Unknown
cve@mitre.orgMariner CVE-2022-37434 Unknown
cve@mitre.orgMariner CVE-2018-25032 Unknown
security-advisories@github.comMariner CVE-2022-31015 Unknown
security-advisories@github.comMariner CVE-2022-24761 Unknown
vultures@jpcert.or.jpMariner CVE-2023-28370 Unknown
cve@mitre.orgMariner CVE-2022-43358 Unknown
cve@mitre.orgMariner CVE-2022-26592 Unknown
cve@mitre.orgMariner CVE-2022-43357 Unknown
cve@mitre.orgMariner CVE-2023-35789 Unknown
cve@mitre.orgMariner CVE-2023-39976 Unknown
cve@mitre.orgMariner CVE-2018-7263 Unknown
cve@mitre.orgMariner CVE-2017-11551 Unknown
cve@mitre.orgMariner CVE-2017-11550 Unknown
cve@mitre.orgMariner CVE-2023-40305 Unknown
security-advisories@github.comMariner CVE-2023-25565 Unknown
cve@mitre.orgMariner CVE-2019-7317 Unknown
security-advisories@github.comMariner CVE-2023-25563 Unknown
cve@mitre.orgMariner CVE-2017-12652 Unknown
cve@mitre.orgMariner CVE-2015-8472 Unknown
cve@mitre.orgMariner CVE-2015-8126 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21665 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21666 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21639 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21631 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56604 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56635 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56631 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-54683 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53179 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-48873 Unknown
security-advisories@github.comMariner CVE-2025-25204 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-47809 Unknown
security@docker.comMariner CVE-2024-10846 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-0725 Unknown
security@golang.orgMariner CVE-2023-3978 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-7264 Unknown
security-advisories@github.comMariner CVE-2024-51744 Unknown
cve@mitre.orgMariner CVE-2024-34403 Unknown
security-advisories@github.comMariner CVE-2024-49769 Unknown
cve@mitre.orgMariner CVE-2024-36039 Unknown
cve@mitre.orgMariner CVE-2004-2779 Unknown
security-advisories@github.comMariner CVE-2023-25566 Unknown
security-advisories@github.comMariner CVE-2023-25567 Unknown
secalert@redhat.comMariner CVE-2025-26600 Unknown
cna@cloudflare.comMariner CVE-2023-6992 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56651 Unknown
security@opentext.comMariner CVE-2016-9842 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56660 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56664 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21636 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-58010 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-58005 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57997 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57951 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57949 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57940 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57913 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57911 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57907 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57906 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57895 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57798 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56786 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56766 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56765 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56783 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56760 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56717 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56675 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56672 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56665 Unknown
security-advisories@github.comMariner CVE-2025-27516 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56667 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57902 Unknown
secalert@redhat.comMariner CVE-2022-41862 Unknown
security-advisories@github.comMariner CVE-2025-22134 Unknown
secalert@redhat.comMariner CVE-2025-26598 Unknown
secalert@redhat.comMariner CVE-2025-26595 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50302 Unknown
secalert@redhat.comMariner CVE-2025-26596 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57901 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56777 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56774 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56728 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56724 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56659 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56662 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56627 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56626 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56600 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56548 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-55916 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53155 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53161 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-47143 Unknown
security-advisories@github.comMariner CVE-2024-53859 Unknown
cve@mitre.orgMariner CVE-2024-36620 Unknown
secalert@redhat.comMariner CVE-2024-10963 Unknown
secalert@redhat.comMariner CVE-2023-40551 Unknown
security@golang.orgMariner CVE-2024-45338 Unknown
security@golang.orgMariner CVE-2022-32149 Unknown
secalert@redhat.comMariner CVE-2024-3727 Unknown
security@ubuntu.comMariner CVE-2022-28737 Unknown
security-advisories@github.comMariner CVE-2024-50349 Unknown
security-advisories@github.comMariner CVE-2024-52006 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21716 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21680 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21638 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57978 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-45828 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57912 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56658 Unknown
cve@mitre.orgMariner CVE-2020-14152 Unknown
cve@mitre.orgMariner CVE-2015-2158 Unknown
security@huntr.devMariner CVE-2024-3651 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21718 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-21637 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57980 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57892 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56763 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56657 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56710 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57938 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57900 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57807 Unknown
cve@mitre.orgMariner CVE-2024-50608 Unknown
secalert@redhat.comMariner CVE-2025-26466 Unknown
secalert@redhat.comMariner CVE-2019-3816 Unknown
secalert@redhat.comMariner CVE-2021-20277 Unknown
secalert@redhat.comMariner CVE-2022-32746 Unknown
secure@intel.comMariner CVE-2019-14584 Unknown
cve@mitre.orgMariner CVE-2022-40898 Unknown
secalert@redhat.comMariner CVE-2024-7383 Unknown
security-advisories@github.comMariner CVE-2024-32020 Unknown
security-advisories@github.comMariner CVE-2024-34062 Unknown
security-advisories@github.comMariner CVE-2025-26618 Unknown
security@apache.orgMariner CVE-2024-52338 Unknown
secalert@redhat.comMariner CVE-2012-2677 Unknown
cve@mitre.orgMariner CVE-2019-9674 Unknown
cve@mitre.orgMariner CVE-2019-20907 Unknown
security@golang.orgMariner CVE-2023-45288 Unknown
security@hashicorp.comMariner CVE-2024-6104 Unknown
facts@wolfssl.comMariner CVE-2024-5288 Unknown
secalert@redhat.comMariner CVE-2020-27840 Unknown
secalert@redhat.comMariner CVE-2023-40550 Unknown
secalert@redhat.comMariner CVE-2023-40548 Unknown
report@snyk.ioMariner CVE-2021-23336 Unknown
cve@mitre.orgMariner CVE-2012-6708 Unknown
cve@mitre.orgMariner CVE-2017-18207 Unknown
secalert@redhat.comMariner CVE-2024-1454 Unknown
security-advisories@github.comMariner CVE-2025-27144 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57802 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56754 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56720 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56640 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56634 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56598 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56567 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56568 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53180 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53215 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-9681 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53151 Unknown
cve@kernel.orgMariner CVE-2024-26973 Unknown
cna@vuldb.comMariner CVE-2025-0840 Unknown
security-advisories@github.comMariner CVE-2024-39908 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56741 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50181 Unknown
secalert@redhat.comMariner CVE-2023-40660 Unknown
security@apache.orgMariner CVE-2021-36374 Unknown
security@apache.orgMariner CVE-2021-36373 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2023-52917 Unknown
cve@mitre.orgMariner CVE-2024-50609 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53150 Unknown
cve@mitre.orgMariner CVE-2017-17522 Unknown
secalert@redhat.comMariner CVE-2025-26594 Unknown
cna@vuldb.comMariner CVE-2025-1176 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53173 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53239 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53206 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53096 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53145 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-48881 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50051 Unknown
security@golang.orgMariner CVE-2025-22869 Unknown
cna@python.orgMariner CVE-2024-9287 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57946 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-36476 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57890 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57841 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57896 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57874 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56785 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56780 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56778 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56779 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56776 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56748 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53226 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56575 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56581 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56595 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57850 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56787 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56781 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56770 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56756 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56745 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56747 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56708 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56688 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56694 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56739 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56670 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56648 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56650 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56643 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56623 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56603 Unknown
cve@mitre.orgMariner CVE-2007-4559 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56605 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56614 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56596 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56587 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56629 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56723 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56615 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56726 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43098 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-40982 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-27061 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-35792 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-35790 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-27026 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26943 Unknown
secalert@redhat.comMariner CVE-2024-12133 Unknown
secalert@redhat.comMariner CVE-2019-3833 Unknown
secalert@redhat.comMariner CVE-2023-1393 Unknown
cve@mitre.orgMariner CVE-2024-37535 Unknown
secalert@redhat.comMariner CVE-2023-40546 Unknown
secalert@redhat.comMariner CVE-2023-40549 Unknown
security-advisories@github.comMariner CVE-2024-32021 Unknown
secalert@redhat.comMariner CVE-2021-20286 Unknown
security-advisories@github.comMariner CVE-2024-32465 Unknown
cna@vuldb.comMariner CVE-2025-1181 Unknown
cna@vuldb.comMariner CVE-2025-1178 Unknown
cve@mitre.orgMariner CVE-2015-9251 Unknown
security-advisories@github.comMariner CVE-2024-25629 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56746 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53146 Unknown
cve-assign@fb.comMariner CVE-2021-24032 Unknown
security@golang.orgMariner CVE-2025-22868 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53156 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56716 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56642 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56715 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56704 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56698 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56602 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56601 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56606 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56622 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56593 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56574 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56578 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56572 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56569 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53217 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53237 Unknown
cna@vuldb.comMariner CVE-2025-1182 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53227 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56369 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53171 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53165 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53157 Unknown
cve@mitre.orgMariner CVE-2020-22217 Unknown
MicrosoftMicrosoft Dataverse CVE-2025-24053 Microsoft Dataverse Elevation of Privilege Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2025-26643 Microsoft Edge (Chromium-based) Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1914 Chromium: CVE-2025-1914 Out of bounds read in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1922 Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1923 Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1915 Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1921 Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1917 Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1918 Chromium: CVE-2025-1918 Out of bounds read in PDFium
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1916 Chromium: CVE-2025-1916 Use after free in Profiles
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1919 Chromium: CVE-2025-1919 Out of bounds read in Media
ChromeMicrosoft Edge (Chromium-based) CVE-2025-2135 Chromium: CVE-2025-2135 Type Confusion in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1920 Chromium: CVE-2025-1920 Type Confusion in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2025-2137 Chromium: CVE-2025-2137 Out of bounds read in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2025-2136 Chromium: CVE-2025-2136 Use after free in Inspector
ChromeMicrosoft Edge (Chromium-based) CVE-2025-24201 Chromium: CVE-2025-24201 Out of bounds write in GPU on Mac
MicrosoftMicrosoft Local Security Authority Server (lsasrv) CVE-2025-24072 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Management Console CVE-2025-26633 Microsoft Management Console Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office CVE-2025-26629 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-24057 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-24083 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-24080 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Access CVE-2025-26630 Microsoft Access Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-24075 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-24082 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-24081 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-24078 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-24079 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-24077 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2025-24046 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2025-24067 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Synaptics, Inc.Microsoft Windows CVE-2024-9157 Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
MicrosoftMicrosoft Windows CVE-2025-25008 Windows Server Elevation of Privilege Vulnerability
MicrosoftRemote Desktop Client CVE-2025-26645 Remote Desktop Client Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2025-24064 Windows Domain Name Service Remote Code Execution Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-24048 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-24050 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftVisual Studio CVE-2025-24998 Visual Studio Elevation of Privilege Vulnerability
MicrosoftVisual Studio CVE-2025-25003 Visual Studio Elevation of Privilege Vulnerability
MicrosoftVisual Studio Code CVE-2025-26631 Visual Studio Code Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2025-24059 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cross Device Service CVE-2025-24994 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
MicrosoftWindows Cross Device Service CVE-2025-24076 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
MicrosoftWindows exFAT File System CVE-2025-21180 Windows exFAT File System Remote Code Execution Vulnerability
MicrosoftWindows Fast FAT Driver CVE-2025-24985 Windows Fast FAT File System Driver Remote Code Execution Vulnerability
MicrosoftWindows File Explorer CVE-2025-24071 Microsoft Windows File Explorer Spoofing Vulnerability
MicrosoftWindows Kernel Memory CVE-2025-24997 DirectX Graphics Kernel File Denial of Service Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2025-24066 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
MicrosoftWindows MapUrlToZone CVE-2025-21247 MapUrlToZone Security Feature Bypass Vulnerability
MicrosoftWindows Mark of the Web (MOTW) CVE-2025-24061 Windows Mark of the Web Security Feature Bypass Vulnerability
MicrosoftWindows NTFS CVE-2025-24984 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-24991 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-24992 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-24993 Windows NTFS Remote Code Execution Vulnerability
MicrosoftWindows NTLM CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability
MicrosoftWindows NTLM CVE-2025-24996 NTLM Hash Disclosure Spoofing Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-24035 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-24045 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-24051 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Subsystem for Linux CVE-2025-24084 Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
MicrosoftWindows Telephony Server CVE-2025-24056 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-24055 Windows USB Video Class System Driver Information Disclosure Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-24987 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-24988 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Win32 Kernel Subsystem CVE-2025-24044 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
MicrosoftWindows Win32 Kernel Subsystem CVE-2025-24983 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

CVE-2021-3672 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-3672
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.6/TemporalScore:5.6
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11/27/2021    

Information published.


1.1    02/27/2025    

Added c-ares to CBL-Mariner 1.0


1.2    02/28/2025    

Added c-ares to CBL-Mariner 1.0


1.3    03/01/2025    

Added c-ares to CBL-Mariner 1.0


1.4    03/02/2025    

Added c-ares to CBL-Mariner 1.0


1.5    03/03/2025    

Added c-ares to CBL-Mariner 1.0


1.6    03/04/2025    

Added c-ares to CBL-Mariner 1.0


1.7    03/05/2025    

Added c-ares to CBL-Mariner 1.0


1.8    03/06/2025    

Added c-ares to CBL-Mariner 1.0


1.9    03/08/2025    

Added c-ares to CBL-Mariner 1.0


2.0    03/09/2025    

Added c-ares to CBL-Mariner 1.0


2.1    03/10/2025    

Added c-ares to CBL-Mariner 1.0


2.2    03/11/2025    

Added c-ares to CBL-Mariner 1.0


2.3    03/12/2025    

Added c-ares to CBL-Mariner 1.0


2.4    03/13/2025    

Added c-ares to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-3672
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Unknown Unknown None
CBL Mariner 1.0 ARM c-ares (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1.18.1-1
Unknown None
CBL Mariner 1.0 x64 c-ares (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1.18.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-3672 None

CVE-2021-23336 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-23336
MITRE
NVD

Issuing CNA: report@snyk.io

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02/27/2021    

Information published.


1.6    06/30/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/15/2024    

Information published.


4.9    08/16/2024    

Information published.


5.0    08/17/2024    

Information published.


5.1    08/18/2024    

Information published.


5.2    08/19/2024    

Information published.


5.3    08/20/2024    

Information published.


5.4    08/21/2024    

Information published.


5.5    08/22/2024    

Information published.


5.6    08/23/2024    

Information published.


5.7    08/24/2024    

Information published.


5.8    08/25/2024    

Information published.


5.9    08/26/2024    

Information published.


6.0    08/27/2024    

Information published.


6.1    08/28/2024    

Information published.


6.2    08/29/2024    

Information published.


6.3    08/30/2024    

Information published.


6.4    08/31/2024    

Information published.


6.5    09/01/2024    

Information published.


6.6    09/02/2024    

Information published.


6.7    09/03/2024    

Information published.


6.8    09/05/2024    

Information published.


6.9    09/06/2024    

Information published.


7.0    09/07/2024    

Information published.


7.1    09/08/2024    

Information published.


7.2    09/11/2024    

Information published.


7.3    09/12/2024    

Information published.


7.4    09/13/2024    

Information published.


7.5    09/14/2024    

Information published.


7.6    09/15/2024    

Information published.


7.7    09/16/2024    

Information published.


7.8    09/17/2024    

Information published.


7.9    09/18/2024    

Information published.


8.0    09/19/2024    

Information published.


8.1    09/20/2024    

Information published.


8.2    09/21/2024    

Information published.


8.3    09/22/2024    

Information published.


8.4    09/23/2024    

Information published.


8.5    09/24/2024    

Information published.


8.6    09/25/2024    

Information published.


8.7    09/26/2024    

Information published.


8.8    09/27/2024    

Information published.


8.9    09/28/2024    

Information published.


9.0    09/29/2024    

Information published.


9.1    09/30/2024    

Information published.


9.2    10/01/2024    

Information published.


9.3    10/02/2024    

Information published.


9.4    10/03/2024    

Information published.


9.5    10/04/2024    

Information published.


9.6    10/05/2024    

Information published.


9.7    10/06/2024    

Information published.


9.8    10/07/2024    

Information published.


9.9    10/08/2024    

Information published.


10.0    10/09/2024    

Information published.


10.1    10/10/2024    

Information published.


10.2    10/11/2024    

Information published.


10.3    10/12/2024    

Information published.


10.4    10/13/2024    

Information published.


10.5    10/14/2024    

Information published.


10.6    10/15/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


10.7    10/16/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


10.8    10/17/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


10.9    10/18/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.0    10/19/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.1    10/20/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.2    10/21/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.3    10/22/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.4    10/23/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.5    10/24/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.6    10/25/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.7    10/26/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.8    10/27/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.9    10/28/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.0    10/29/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.1    10/30/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.2    10/31/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.3    11/01/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.4    11/02/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.5    11/04/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.6    11/05/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.7    11/06/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.8    11/07/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.9    11/08/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.0    11/09/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.1    11/10/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.2    11/11/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.3    11/12/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.4    11/13/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.5    11/14/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.6    11/15/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.7    11/16/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.8    11/17/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.9    11/18/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.0    11/19/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.1    11/20/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.2    11/21/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.3    11/23/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.4    11/24/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.5    11/25/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.6    11/26/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.7    11/27/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.8    11/28/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.9    11/29/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.0    11/30/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.1    12/01/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.2    12/02/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.3    12/03/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.4    12/04/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.5    12/05/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.6    12/07/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.7    12/08/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.8    12/09/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.9    12/10/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.0    12/11/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.1    12/12/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.2    12/13/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.3    12/14/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.4    12/15/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.5    12/16/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.6    12/17/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.7    12/18/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.8    12/19/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.9    12/20/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.0    12/21/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.1    12/22/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.2    12/23/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.3    12/24/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.4    12/25/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.5    12/26/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.6    12/27/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.7    12/28/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.8    12/29/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.9    12/30/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.0    12/31/2024    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.1    01/01/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.2    01/02/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.3    01/03/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.4    01/04/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.5    01/05/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.6    01/06/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.7    01/07/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.8    01/08/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.9    01/09/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.0    01/10/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.1    01/11/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.2    01/12/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.3    01/13/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.4    01/15/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.5    01/16/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.6    01/17/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.7    01/18/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.8    01/19/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.9    01/20/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.0    01/21/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.1    01/22/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.2    01/23/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.3    01/24/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.4    01/25/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.5    01/27/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.6    01/28/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.7    01/29/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.8    01/30/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.9    02/01/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.0    02/02/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.1    02/03/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.2    02/04/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.3    02/05/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.4    02/07/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.5    02/08/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.6    02/09/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.7    02/10/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.8    02/11/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.9    02/12/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.0    02/13/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.1    02/14/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.2    02/15/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.3    02/16/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.4    02/17/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.5    02/18/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.6    02/19/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.7    02/20/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.8    02/21/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.9    02/22/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.0    02/23/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.1    02/24/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.2    02/25/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.3    02/26/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.4    02/27/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.5    02/28/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.6    03/01/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.7    03/02/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.8    03/03/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.9    03/04/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.0    03/05/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.1    03/06/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.2    03/08/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.3    03/09/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.4    03/10/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.5    03/11/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.6    03/12/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.7    03/13/2025    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-23336
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
2.7.18-6

3.7.10-3
None
CBL Mariner 1.0 x64 python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
2.7.18-6

3.7.10-3
None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-23336 None

CVE-2023-40548 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40548
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    12/07/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.2    12/08/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.3    12/09/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.4    12/10/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.5    12/11/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.6    12/12/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.7    12/13/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.8    12/14/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.9    12/15/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.0    12/16/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.1    12/17/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.2    12/18/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.3    12/19/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.4    12/20/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.5    12/21/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.6    12/22/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.7    12/23/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.8    12/24/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.9    12/25/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    12/26/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.1    12/27/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.2    12/28/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.3    12/29/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.4    12/30/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.5    12/31/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.6    01/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.7    01/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.8    01/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.9    01/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    01/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.1    01/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.2    01/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.3    01/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.4    01/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.5    01/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.6    01/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.7    01/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.8    01/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.9    01/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    01/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.1    01/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.2    01/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.3    01/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.4    01/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.5    01/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.6    01/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.7    01/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.8    01/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.9    01/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.0    01/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.1    01/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.2    01/29/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.3    01/30/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.4    02/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.5    02/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.6    02/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.7    02/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.8    02/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.9    02/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.0    02/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.1    02/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.2    02/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.3    02/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.4    02/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.5    02/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.6    02/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.7    02/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.8    02/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.9    02/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.0    02/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.1    02/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.2    02/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.3    02/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.4    02/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.5    02/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.6    02/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.7    02/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.8    02/26/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.9    02/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.0    02/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.1    03/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.2    03/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.3    03/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.4    03/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.5    03/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.6    03/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.7    03/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.8    03/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.9    03/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.0    03/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.1    03/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.2    03/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40548
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-5
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-5
None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-1
None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40548 None

CVE-2023-40550 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40550
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    12/07/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.2    12/08/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.3    12/09/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.4    12/10/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.5    12/11/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.6    12/12/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.7    12/13/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.8    12/14/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.9    12/15/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.0    12/16/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.1    12/17/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.2    12/18/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.3    12/19/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.4    12/20/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.5    12/21/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.6    12/22/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.7    12/23/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.8    12/24/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.9    12/25/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    12/26/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.1    12/27/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.2    12/28/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.3    12/29/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.4    12/30/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.5    12/31/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.6    01/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.7    01/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.8    01/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.9    01/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    01/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.1    01/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.2    01/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.3    01/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.4    01/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.5    01/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.6    01/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.7    01/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.8    01/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.9    01/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    01/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.1    01/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.2    01/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.3    01/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.4    01/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.5    01/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.6    01/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.7    01/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.8    01/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.9    01/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.0    01/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.1    01/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.2    01/29/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.3    01/30/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.4    02/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.5    02/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.6    02/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.7    02/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.8    02/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.9    02/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.0    02/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.1    02/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.2    02/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.3    02/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.4    02/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.5    02/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.6    02/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.7    02/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.8    02/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.9    02/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.0    02/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.1    02/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.2    02/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.3    02/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.4    02/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.5    02/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.6    02/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.7    02/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.8    02/26/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.9    02/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.0    02/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.1    03/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.2    03/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.3    03/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.4    03/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.5    03/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.6    03/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.7    03/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.8    03/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.9    03/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.0    03/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.1    03/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.2    03/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40550
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-5
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-5
None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-1
None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40550 None

CVE-2020-27840 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2020-27840
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/15/2024    

Information published.


1.1    10/16/2024    

Added samba to Azure Linux 3.0


1.2    10/17/2024    

Added samba to Azure Linux 3.0


1.3    10/18/2024    

Added samba to Azure Linux 3.0


1.4    10/19/2024    

Added samba to Azure Linux 3.0


1.5    10/20/2024    

Added samba to Azure Linux 3.0


1.6    10/21/2024    

Added samba to Azure Linux 3.0


1.7    10/22/2024    

Added samba to Azure Linux 3.0


1.8    10/23/2024    

Added samba to Azure Linux 3.0


1.9    10/24/2024    

Added samba to Azure Linux 3.0


2.0    10/25/2024    

Added samba to Azure Linux 3.0


2.1    10/26/2024    

Added samba to Azure Linux 3.0


2.2    10/27/2024    

Added samba to Azure Linux 3.0


2.3    10/28/2024    

Added samba to Azure Linux 3.0


2.4    10/29/2024    

Added samba to Azure Linux 3.0


2.5    10/30/2024    

Added samba to Azure Linux 3.0


2.6    10/31/2024    

Added samba to Azure Linux 3.0


2.7    11/01/2024    

Added samba to Azure Linux 3.0


2.8    11/02/2024    

Added samba to Azure Linux 3.0


2.9    11/04/2024    

Added samba to Azure Linux 3.0


3.0    11/05/2024    

Added samba to Azure Linux 3.0


3.1    11/06/2024    

Added samba to Azure Linux 3.0


3.2    11/07/2024    

Added samba to Azure Linux 3.0


3.3    11/08/2024    

Added samba to Azure Linux 3.0


3.4    11/09/2024    

Added samba to Azure Linux 3.0


3.5    11/10/2024    

Added samba to Azure Linux 3.0


3.6    11/11/2024    

Added samba to Azure Linux 3.0


3.7    11/12/2024    

Added samba to Azure Linux 3.0


3.8    11/13/2024    

Added samba to Azure Linux 3.0


3.9    11/14/2024    

Added samba to Azure Linux 3.0


4.0    11/15/2024    

Added samba to Azure Linux 3.0


4.1    11/16/2024    

Added samba to Azure Linux 3.0


4.2    11/17/2024    

Added samba to Azure Linux 3.0


4.3    11/18/2024    

Added samba to Azure Linux 3.0


4.4    11/19/2024    

Added samba to Azure Linux 3.0


4.5    11/20/2024    

Added samba to Azure Linux 3.0


4.6    11/21/2024    

Added samba to Azure Linux 3.0


4.7    11/23/2024    

Added samba to Azure Linux 3.0


4.8    11/24/2024    

Added samba to Azure Linux 3.0


4.9    11/25/2024    

Added samba to Azure Linux 3.0


5.0    11/26/2024    

Added samba to Azure Linux 3.0


5.1    11/27/2024    

Added samba to Azure Linux 3.0


5.2    11/28/2024    

Added samba to Azure Linux 3.0


5.3    11/29/2024    

Added samba to Azure Linux 3.0


5.4    11/30/2024    

Added samba to Azure Linux 3.0


5.5    12/01/2024    

Added samba to Azure Linux 3.0


5.6    12/02/2024    

Added samba to Azure Linux 3.0


5.7    12/03/2024    

Added samba to Azure Linux 3.0


5.8    12/04/2024    

Added samba to Azure Linux 3.0


5.9    12/05/2024    

Added samba to Azure Linux 3.0


6.0    12/07/2024    

Added samba to Azure Linux 3.0


6.1    12/08/2024    

Added samba to Azure Linux 3.0


6.2    12/09/2024    

Added samba to Azure Linux 3.0


6.3    12/10/2024    

Added samba to Azure Linux 3.0


6.4    12/11/2024    

Added samba to Azure Linux 3.0


6.5    12/12/2024    

Added samba to Azure Linux 3.0


6.6    12/13/2024    

Added samba to Azure Linux 3.0


6.7    12/14/2024    

Added samba to Azure Linux 3.0


6.8    12/15/2024    

Added samba to Azure Linux 3.0


6.9    12/16/2024    

Added samba to Azure Linux 3.0


7.0    12/17/2024    

Added samba to Azure Linux 3.0


7.1    12/18/2024    

Added samba to Azure Linux 3.0


7.2    12/19/2024    

Added samba to Azure Linux 3.0


7.3    12/20/2024    

Added samba to Azure Linux 3.0


7.4    12/21/2024    

Added samba to Azure Linux 3.0


7.5    12/22/2024    

Added samba to Azure Linux 3.0


7.6    12/23/2024    

Added samba to Azure Linux 3.0


7.7    12/24/2024    

Added samba to Azure Linux 3.0


7.8    12/25/2024    

Added samba to Azure Linux 3.0


7.9    12/26/2024    

Added samba to Azure Linux 3.0


8.0    12/27/2024    

Added samba to Azure Linux 3.0


8.1    12/28/2024    

Added samba to Azure Linux 3.0


8.2    12/29/2024    

Added samba to Azure Linux 3.0


8.3    12/30/2024    

Added samba to Azure Linux 3.0


8.4    12/31/2024    

Added samba to Azure Linux 3.0


8.5    01/01/2025    

Added samba to Azure Linux 3.0


8.6    01/02/2025    

Added samba to Azure Linux 3.0


8.7    01/03/2025    

Added samba to Azure Linux 3.0


8.8    01/04/2025    

Added samba to Azure Linux 3.0


8.9    01/05/2025    

Added samba to Azure Linux 3.0


9.0    01/06/2025    

Added samba to Azure Linux 3.0


9.1    01/07/2025    

Added samba to Azure Linux 3.0


9.2    01/08/2025    

Added samba to Azure Linux 3.0


9.3    01/09/2025    

Added samba to Azure Linux 3.0


9.4    01/10/2025    

Added samba to Azure Linux 3.0


9.5    01/11/2025    

Added samba to Azure Linux 3.0


9.6    01/12/2025    

Added samba to Azure Linux 3.0


9.7    01/13/2025    

Added samba to Azure Linux 3.0


9.8    01/15/2025    

Added samba to Azure Linux 3.0


9.9    01/16/2025    

Added samba to Azure Linux 3.0


10.0    01/17/2025    

Added samba to Azure Linux 3.0


10.1    01/18/2025    

Added samba to Azure Linux 3.0


10.2    01/19/2025    

Added samba to Azure Linux 3.0


10.3    01/20/2025    

Added samba to Azure Linux 3.0


10.4    01/21/2025    

Added samba to Azure Linux 3.0


10.5    01/22/2025    

Added samba to Azure Linux 3.0


10.6    01/23/2025    

Added samba to Azure Linux 3.0


10.7    01/24/2025    

Added samba to Azure Linux 3.0


10.8    01/25/2025    

Added samba to Azure Linux 3.0


10.9    01/27/2025    

Added samba to Azure Linux 3.0


11.0    01/28/2025    

Added samba to Azure Linux 3.0


11.1    01/29/2025    

Added samba to Azure Linux 3.0


11.2    01/30/2025    

Added samba to Azure Linux 3.0


11.3    02/01/2025    

Added samba to Azure Linux 3.0


11.4    02/02/2025    

Added samba to Azure Linux 3.0


11.5    02/03/2025    

Added samba to Azure Linux 3.0


11.6    02/04/2025    

Added samba to Azure Linux 3.0


11.7    02/05/2025    

Added samba to Azure Linux 3.0


11.8    02/07/2025    

Added samba to Azure Linux 3.0


11.9    02/08/2025    

Added samba to Azure Linux 3.0


12.0    02/09/2025    

Added samba to Azure Linux 3.0


12.1    02/10/2025    

Added samba to Azure Linux 3.0


12.2    02/11/2025    

Added samba to Azure Linux 3.0


12.3    02/12/2025    

Added samba to Azure Linux 3.0


12.4    02/13/2025    

Added samba to Azure Linux 3.0


12.5    02/14/2025    

Added samba to Azure Linux 3.0


12.6    02/15/2025    

Added samba to Azure Linux 3.0


12.7    02/16/2025    

Added samba to Azure Linux 3.0


12.8    02/17/2025    

Added samba to Azure Linux 3.0


12.9    02/18/2025    

Added samba to Azure Linux 3.0


13.0    02/19/2025    

Added samba to Azure Linux 3.0


13.1    02/20/2025    

Added samba to Azure Linux 3.0


13.2    02/21/2025    

Added samba to Azure Linux 3.0


13.3    02/22/2025    

Added samba to Azure Linux 3.0


13.4    02/23/2025    

Added samba to Azure Linux 3.0


13.5    02/24/2025    

Added samba to Azure Linux 3.0


13.6    02/25/2025    

Added samba to Azure Linux 3.0


13.7    02/26/2025    

Added samba to Azure Linux 3.0


13.8    02/27/2025    

Added samba to Azure Linux 3.0


13.9    02/28/2025    

Added samba to Azure Linux 3.0


14.0    03/01/2025    

Added samba to Azure Linux 3.0


14.1    03/02/2025    

Added samba to Azure Linux 3.0


14.2    03/03/2025    

Added samba to Azure Linux 3.0


14.3    03/04/2025    

Added samba to Azure Linux 3.0


14.4    03/05/2025    

Added samba to Azure Linux 3.0


14.5    03/06/2025    

Added samba to Azure Linux 3.0


14.6    03/08/2025    

Added samba to Azure Linux 3.0


14.7    03/09/2025    

Added samba to Azure Linux 3.0


14.8    03/10/2025    

Added samba to Azure Linux 3.0


14.9    03/11/2025    

Added samba to Azure Linux 3.0


15.0    03/12/2025    

Added samba to Azure Linux 3.0


15.1    03/14/2025    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2020-27840
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2020-27840 None

CVE-2024-5288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-5288
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/07/2024    

Information published.


1.1    12/12/2024    

Added mariadb to CBL-Mariner 2.0 Added mariadb to Azure Linux 3.0


1.2    03/01/2025    

Added mariadb to CBL-Mariner 2.0 Added mariadb to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-5288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1
Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1
Unknown None
CBL Mariner 2.0 ARM mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.6.20-1
Unknown None
CBL Mariner 2.0 x64 mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.6.20-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-5288 None

CVE-2024-6104 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6104
MITRE
NVD

Issuing CNA: security@hashicorp.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/05/2024    

Information published.


1.1    08/15/2024    

Information published.


1.2    08/16/2024    

Information published.


1.3    08/17/2024    

Information published.


1.4    08/18/2024    

Information published.


1.5    08/19/2024    

Information published.


1.6    08/20/2024    

Information published.


1.7    08/21/2024    

Information published.


1.8    08/22/2024    

Information published.


1.9    08/23/2024    

Information published.


2.0    08/24/2024    

Information published.


2.1    08/25/2024    

Information published.


2.2    08/26/2024    

Information published.


2.3    08/27/2024    

Information published.


2.4    08/28/2024    

Information published.


2.5    08/29/2024    

Information published.


2.6    08/30/2024    

Information published.


2.7    08/31/2024    

Information published.


2.8    09/01/2024    

Information published.


2.9    09/02/2024    

Information published.


3.0    09/03/2024    

Information published.


3.1    09/05/2024    

Information published.


3.2    09/06/2024    

Information published.


3.3    09/07/2024    

Information published.


3.4    09/08/2024    

Information published.


3.5    09/11/2024    

Information published.


3.6    09/13/2024    

Information published.


3.7    09/14/2024    

Information published.


3.8    09/15/2024    

Information published.


3.9    09/16/2024    

Information published.


4.0    09/17/2024    

Information published.


4.1    09/18/2024    

Information published.


4.2    09/19/2024    

Information published.


4.3    09/20/2024    

Information published.


4.4    09/21/2024    

Information published.


4.5    09/22/2024    

Information published.


4.6    09/23/2024    

Information published.


4.7    09/24/2024    

Information published.


4.8    09/25/2024    

Information published.


4.9    09/26/2024    

Information published.


5.0    09/27/2024    

Information published.


5.1    09/28/2024    

Information published.


5.2    09/29/2024    

Information published.


5.3    09/30/2024    

Information published.


5.4    10/01/2024    

Information published.


5.5    10/02/2024    

Information published.


5.6    10/03/2024    

Information published.


5.7    10/04/2024    

Information published.


5.8    10/05/2024    

Information published.


5.9    10/06/2024    

Information published.


6.0    10/07/2024    

Information published.


6.1    10/08/2024    

Information published.


6.2    10/09/2024    

Information published.


6.3    10/11/2024    

Information published.


6.4    10/12/2024    

Information published.


6.5    10/13/2024    

Information published.


6.6    10/14/2024    

Information published.


6.7    10/15/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


6.8    10/16/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


6.9    10/17/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.0    10/18/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.1    10/19/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.2    10/20/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.3    10/21/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.4    10/22/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.5    10/23/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.6    10/24/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.7    10/25/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.8    10/26/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.9    10/27/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.0    10/28/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.1    10/29/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.2    10/30/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.3    10/31/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.4    11/01/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.5    11/02/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.6    11/04/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.7    11/05/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.8    11/06/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.9    11/07/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.0    11/08/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.1    11/09/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.2    11/10/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.3    11/11/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.4    11/12/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.5    11/13/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.6    11/14/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.7    11/15/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.8    11/16/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.9    11/17/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.0    11/18/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.1    11/19/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.2    11/20/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.3    11/21/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.4    11/23/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.5    11/24/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.6    11/25/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.7    11/26/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.8    11/27/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.9    11/28/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.0    11/29/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.1    11/30/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.2    12/01/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.3    12/02/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.4    12/03/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.5    12/04/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.6    12/05/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.7    12/07/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.8    12/08/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.9    12/09/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.0    12/10/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.1    12/11/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.2    12/12/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.3    12/13/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.4    12/14/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.5    12/15/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.6    12/16/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.7    12/17/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.8    12/18/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.9    12/19/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.0    12/20/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.1    12/21/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.2    12/22/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.3    12/23/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.4    12/24/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.5    12/25/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.6    12/26/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.7    12/27/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.8    12/28/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.9    12/29/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.0    12/30/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.1    12/31/2024    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.2    01/01/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.3    01/02/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.4    01/03/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.5    01/04/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.6    01/05/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.7    01/06/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.8    01/07/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.9    01/08/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.0    01/09/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.1    01/10/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.2    01/11/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.3    01/12/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.4    01/13/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.5    01/15/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.6    01/16/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.7    01/17/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.8    01/18/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.9    01/19/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.0    01/20/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.1    01/21/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.2    01/22/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.3    01/23/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.4    01/24/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.5    01/25/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.6    01/27/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.7    01/28/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.8    01/29/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.9    01/30/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.0    02/01/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.1    02/02/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.2    02/03/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.3    02/04/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.4    02/05/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.5    02/07/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.6    02/08/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.7    02/09/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.8    02/10/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.9    02/11/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.0    02/12/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.1    02/13/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.2    02/14/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.3    02/15/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.4    02/16/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.5    02/17/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.6    02/18/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.7    02/19/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.8    02/20/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.9    02/21/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.0    02/22/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.1    02/23/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.2    02/24/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.3    02/25/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.4    02/26/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.5    02/27/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.6    02/28/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.7    03/01/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.8    03/02/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.9    03/03/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.0    03/04/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.1    03/05/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.2    03/06/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.3    03/08/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.4    03/09/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.5    03/10/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.6    03/11/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.7    03/12/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.8    03/13/2025    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6104
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcontainers-common (CBL-Mariner)
cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
20240213-2

1.12.12-3
2.7.3-5
2.14.0-2
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
libcontainers-common (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.12.12-3

2.7.3-5
2.14.0-2
20240213-2
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.11.2-12

2.6.1-15
2.4.0-22
1.9.5-2
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.11.2-12

2.6.1-15
2.4.0-22
1.9.5-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6104 None

CVE-2023-45288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45288
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    04/08/2024    

Information published.


1.1    04/20/2024    

Information published.


1.2    06/30/2024    

Information published.


1.3    07/02/2024    

Information published.


1.4    07/12/2024    

Information published.


1.5    08/07/2024    

Information published.


1.6    08/08/2024    

Information published.


1.7    08/09/2024    

Information published.


1.8    08/10/2024    

Information published.


1.9    08/11/2024    

Information published.


2.0    08/12/2024    

Information published.


2.1    08/15/2024    

Information published.


2.2    08/16/2024    

Information published.


2.3    08/17/2024    

Information published.


2.4    08/18/2024    

Information published.


2.5    08/19/2024    

Information published.


2.6    08/20/2024    

Information published.


2.7    08/21/2024    

Information published.


2.8    08/22/2024    

Information published.


2.9    08/23/2024    

Information published.


3.0    08/24/2024    

Information published.


3.1    08/25/2024    

Information published.


3.2    08/26/2024    

Information published.


3.3    09/11/2024    

Information published.


3.4    09/13/2024    

Information published.


3.5    09/14/2024    

Information published.


3.6    09/15/2024    

Information published.


3.7    09/16/2024    

Information published.


3.8    09/17/2024    

Information published.


3.9    09/18/2024    

Information published.


4.0    09/19/2024    

Information published.


4.1    09/20/2024    

Information published.


4.2    09/21/2024    

Information published.


4.3    09/22/2024    

Information published.


4.4    09/23/2024    

Information published.


4.5    09/24/2024    

Information published.


4.6    09/25/2024    

Information published.


4.7    09/26/2024    

Information published.


4.8    09/27/2024    

Information published.


4.9    09/28/2024    

Information published.


5.0    09/29/2024    

Information published.


5.1    09/30/2024    

Information published.


5.2    10/01/2024    

Information published.


5.3    10/02/2024    

Information published.


5.4    10/03/2024    

Information published.


5.5    10/04/2024    

Information published.


5.6    10/05/2024    

Information published.


5.7    10/06/2024    

Information published.


5.8    10/07/2024    

Information published.


5.9    10/09/2024    

Information published.


6.0    10/10/2024    

Information published.


6.1    10/11/2024    

Information published.


6.2    10/12/2024    

Information published.


6.3    10/13/2024    

Information published.


6.4    10/14/2024    

Information published.


6.5    10/15/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.6    10/16/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.7    10/17/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.8    10/18/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.9    10/19/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.0    10/20/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.1    10/21/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.2    10/22/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.3    10/23/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.4    10/24/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.5    10/25/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.6    10/26/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.7    10/27/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.8    10/28/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.9    10/29/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.0    10/30/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.1    10/31/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.2    11/01/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.3    11/02/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.4    11/04/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.5    11/05/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.6    11/06/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.7    11/07/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.8    11/08/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.9    11/09/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.0    11/10/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.1    11/11/2024    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.2    11/12/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.3    11/13/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.4    11/14/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.5    11/15/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.6    11/16/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.7    11/17/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.8    11/18/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.9    11/19/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.0    11/20/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.1    11/21/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.2    11/23/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.3    11/24/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.4    11/25/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.5    11/26/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.6    11/27/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.7    11/28/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.8    11/29/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.9    11/30/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.0    12/01/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.1    12/02/2024    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.2    12/03/2024    

Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.3    12/04/2024    

Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.4    12/05/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.5    12/07/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.6    12/08/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.7    12/09/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.8    12/10/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.9    12/11/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.0    12/12/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.1    12/13/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.2    12/14/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.3    12/15/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.4    12/16/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.5    12/17/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.6    12/18/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.7    12/19/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.8    12/20/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.9    12/21/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.0    12/22/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.1    12/23/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.2    12/24/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.3    12/25/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.4    12/26/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.5    12/27/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.6    12/28/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.7    12/29/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.8    12/30/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.9    12/31/2024    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.0    01/01/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.1    01/02/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.2    01/03/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.3    01/04/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.4    01/05/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.5    01/06/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.6    01/07/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.7    01/08/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.8    01/09/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.9    01/10/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.0    01/11/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.1    01/12/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.2    01/13/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.3    01/15/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.4    01/16/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.5    01/17/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.6    01/18/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.7    01/19/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.8    01/20/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.9    01/21/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.0    01/22/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.1    01/23/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.2    01/24/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.3    01/25/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.4    01/27/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.5    01/28/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.6    01/29/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.7    01/30/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.8    02/01/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.9    02/02/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.0    02/03/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.1    02/04/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.2    02/05/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.3    02/07/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.4    02/08/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.5    02/09/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.6    02/10/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.7    02/11/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.8    02/12/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.9    02/13/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.0    02/15/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.1    02/16/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.2    02/17/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.3    02/18/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.4    02/19/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.5    02/20/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.6    02/21/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.7    02/22/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.8    02/23/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.9    02/24/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.0    02/25/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.1    02/26/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.2    02/27/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.3    02/28/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.4    03/01/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.5    03/02/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.6    03/03/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.7    03/04/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.8    03/05/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.9    03/06/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.0    03/08/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.1    03/09/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.2    03/10/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.3    03/11/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.4    03/12/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.5    03/13/2025    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerized-data-importer to Azure Linux 3.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.7.7-1

10.25.1-1
2.3.0-1
1.12.12-1
None
Azure Linux 3.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.7.7-1

10.25.1-1
2.3.0-1
1.12.12-1
None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1

2.1.2-3
1.11.2-9
1.11.1-8
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1

2.1.2-3
1.11.2-9
1.11.1-8
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45288 None

CVE-2019-20907 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-20907
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/18/2020    

Information published.


1.6    06/30/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/15/2024    

Information published.


4.9    08/16/2024    

Information published.


5.0    08/17/2024    

Information published.


5.1    08/18/2024    

Information published.


5.2    08/19/2024    

Information published.


5.3    08/20/2024    

Information published.


5.4    08/21/2024    

Information published.


5.5    08/22/2024    

Information published.


5.6    08/23/2024    

Information published.


5.7    08/24/2024    

Information published.


5.8    08/25/2024    

Information published.


5.9    08/26/2024    

Information published.


6.0    08/27/2024    

Information published.


6.1    08/28/2024    

Information published.


6.2    08/29/2024    

Information published.


6.3    08/30/2024    

Information published.


6.4    08/31/2024    

Information published.


6.5    09/01/2024    

Information published.


6.6    09/02/2024    

Information published.


6.7    09/03/2024    

Information published.


6.8    09/05/2024    

Information published.


6.9    09/06/2024    

Information published.


7.0    09/07/2024    

Information published.


7.1    09/08/2024    

Information published.


7.2    09/11/2024    

Information published.


7.3    09/12/2024    

Information published.


7.4    09/13/2024    

Information published.


7.5    09/14/2024    

Information published.


7.6    09/15/2024    

Information published.


7.7    09/16/2024    

Information published.


7.8    09/17/2024    

Information published.


7.9    09/18/2024    

Information published.


8.0    09/19/2024    

Information published.


8.1    09/20/2024    

Information published.


8.2    09/21/2024    

Information published.


8.3    09/22/2024    

Information published.


8.4    09/23/2024    

Information published.


8.5    09/24/2024    

Information published.


8.6    09/25/2024    

Information published.


8.7    09/26/2024    

Information published.


8.8    09/27/2024    

Information published.


8.9    09/28/2024    

Information published.


9.0    09/29/2024    

Information published.


9.1    09/30/2024    

Information published.


9.2    10/01/2024    

Information published.


9.3    10/02/2024    

Information published.


9.4    10/03/2024    

Information published.


9.5    10/04/2024    

Information published.


9.6    10/05/2024    

Information published.


9.7    10/06/2024    

Information published.


9.8    10/07/2024    

Information published.


9.9    10/08/2024    

Information published.


10.0    10/09/2024    

Information published.


10.1    10/10/2024    

Information published.


10.2    10/11/2024    

Information published.


10.3    10/12/2024    

Information published.


10.4    10/13/2024    

Information published.


10.5    10/14/2024    

Information published.


10.6    10/15/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


10.7    10/16/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


10.8    10/17/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


10.9    10/18/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.0    10/19/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.1    10/20/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.2    10/21/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.3    10/22/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.4    10/23/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.5    10/24/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.6    10/25/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.7    10/26/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.8    10/27/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.9    10/28/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.0    10/29/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.1    10/30/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.2    10/31/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.3    11/01/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.4    11/02/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.5    11/04/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.6    11/05/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.7    11/06/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.8    11/07/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.9    11/08/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.0    11/09/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.1    11/10/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.2    11/11/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.3    11/12/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.4    11/13/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.5    11/14/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.6    11/15/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.7    11/16/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.8    11/17/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.9    11/18/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.0    11/19/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.1    11/20/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.2    11/21/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.3    11/23/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.4    11/24/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.5    11/25/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.6    11/26/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.7    11/27/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.8    11/28/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.9    11/29/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.0    11/30/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.1    12/01/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.2    12/02/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.3    12/03/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.4    12/04/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.5    12/05/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.6    12/07/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.7    12/08/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.8    12/09/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.9    12/10/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.0    12/11/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.1    12/12/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.2    12/13/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.3    12/14/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.4    12/15/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.5    12/16/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.6    12/17/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.7    12/18/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.8    12/19/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.9    12/20/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.0    12/21/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.1    12/22/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.2    12/23/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.3    12/24/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.4    12/25/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.5    12/26/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.6    12/27/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.7    12/28/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.8    12/29/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.9    12/30/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.0    12/31/2024    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.1    01/01/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.2    01/02/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.3    01/03/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.4    01/04/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.5    01/05/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.6    01/06/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.7    01/07/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.8    01/08/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.9    01/09/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.0    01/10/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.1    01/11/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.2    01/12/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.3    01/13/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.4    01/15/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.5    01/16/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.6    01/17/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.7    01/18/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.8    01/19/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.9    01/20/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.0    01/21/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.1    01/22/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.2    01/23/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.3    01/24/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.4    01/25/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.5    01/27/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.6    01/28/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.7    01/29/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.8    01/30/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.9    02/01/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.0    02/02/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.1    02/03/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.2    02/04/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.3    02/05/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.4    02/07/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.5    02/08/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.6    02/09/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.7    02/10/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.8    02/11/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.9    02/12/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.0    02/13/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.1    02/14/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.2    02/15/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.3    02/16/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.4    02/17/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.5    02/18/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.6    02/19/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.7    02/20/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.8    02/21/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.9    02/22/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.0    02/23/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.1    02/24/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.2    02/25/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.3    02/26/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.4    02/27/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.5    02/28/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.6    03/01/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.7    03/02/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.8    03/03/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.9    03/04/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.0    03/05/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.1    03/06/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.2    03/08/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.3    03/09/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.4    03/10/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.5    03/11/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.6    03/12/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.7    03/13/2025    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-20907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5

3.7.10-3
None
CBL Mariner 1.0 x64 python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5

3.7.10-3
None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-20907 None

CVE-2019-9674 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-9674
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/18/2020    

Information published.


1.6    06/30/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/15/2024    

Information published.


4.9    08/16/2024    

Information published.


5.0    08/17/2024    

Information published.


5.1    08/18/2024    

Information published.


5.2    08/19/2024    

Information published.


5.3    08/20/2024    

Information published.


5.4    08/21/2024    

Information published.


5.5    08/22/2024    

Information published.


5.6    08/23/2024    

Information published.


5.7    08/24/2024    

Information published.


5.8    08/25/2024    

Information published.


5.9    08/26/2024    

Information published.


6.0    08/27/2024    

Information published.


6.1    08/28/2024    

Information published.


6.2    08/29/2024    

Information published.


6.3    08/30/2024    

Information published.


6.4    08/31/2024    

Information published.


6.5    09/01/2024    

Information published.


6.6    09/02/2024    

Information published.


6.7    09/03/2024    

Information published.


6.8    09/05/2024    

Information published.


6.9    09/06/2024    

Information published.


7.0    09/07/2024    

Information published.


7.1    09/08/2024    

Information published.


7.2    09/11/2024    

Information published.


7.3    09/12/2024    

Information published.


7.4    09/13/2024    

Information published.


7.5    09/14/2024    

Information published.


7.6    09/15/2024    

Information published.


7.7    09/16/2024    

Information published.


7.8    09/17/2024    

Information published.


7.9    09/18/2024    

Information published.


8.0    09/19/2024    

Information published.


8.1    09/20/2024    

Information published.


8.2    09/21/2024    

Information published.


8.3    09/22/2024    

Information published.


8.4    09/23/2024    

Information published.


8.5    09/24/2024    

Information published.


8.6    09/25/2024    

Information published.


8.7    09/26/2024    

Information published.


8.8    09/27/2024    

Information published.


8.9    09/28/2024    

Information published.


9.0    09/29/2024    

Information published.


9.1    09/30/2024    

Information published.


9.2    10/01/2024    

Information published.


9.3    10/02/2024    

Information published.


9.4    10/03/2024    

Information published.


9.5    10/04/2024    

Information published.


9.6    10/05/2024    

Information published.


9.7    10/06/2024    

Information published.


9.8    10/07/2024    

Information published.


9.9    10/08/2024    

Information published.


10.0    10/09/2024    

Information published.


10.1    10/10/2024    

Information published.


10.2    10/11/2024    

Information published.


10.3    10/12/2024    

Information published.


10.4    10/13/2024    

Information published.


10.5    10/14/2024    

Information published.


10.6    10/15/2024    

Added python2 to CBL-Mariner 1.0


10.7    10/16/2024    

Added python2 to CBL-Mariner 1.0


10.8    10/17/2024    

Added python2 to CBL-Mariner 1.0


10.9    10/18/2024    

Added python2 to CBL-Mariner 1.0


11.0    10/19/2024    

Added python2 to CBL-Mariner 1.0


11.1    10/20/2024    

Added python2 to CBL-Mariner 1.0


11.2    10/21/2024    

Added python2 to CBL-Mariner 1.0


11.3    10/22/2024    

Added python2 to CBL-Mariner 1.0


11.4    10/23/2024    

Added python2 to CBL-Mariner 1.0


11.5    10/24/2024    

Added python2 to CBL-Mariner 1.0


11.6    10/25/2024    

Added python2 to CBL-Mariner 1.0


11.7    10/26/2024    

Added python2 to CBL-Mariner 1.0


11.8    10/27/2024    

Added python2 to CBL-Mariner 1.0


11.9    10/28/2024    

Added python2 to CBL-Mariner 1.0


12.0    10/29/2024    

Added python2 to CBL-Mariner 1.0


12.1    10/30/2024    

Added python2 to CBL-Mariner 1.0


12.2    10/31/2024    

Added python2 to CBL-Mariner 1.0


12.3    11/01/2024    

Added python2 to CBL-Mariner 1.0


12.4    11/02/2024    

Added python2 to CBL-Mariner 1.0


12.5    11/04/2024    

Added python2 to CBL-Mariner 1.0


12.6    11/05/2024    

Added python2 to CBL-Mariner 1.0


12.7    11/06/2024    

Added python2 to CBL-Mariner 1.0


12.8    11/07/2024    

Added python2 to CBL-Mariner 1.0


12.9    11/08/2024    

Added python2 to CBL-Mariner 1.0


13.0    11/09/2024    

Added python2 to CBL-Mariner 1.0


13.1    11/10/2024    

Added python2 to CBL-Mariner 1.0


13.2    11/11/2024    

Added python2 to CBL-Mariner 1.0


13.3    11/12/2024    

Added python2 to CBL-Mariner 1.0


13.4    11/13/2024    

Added python2 to CBL-Mariner 1.0


13.5    11/14/2024    

Added python2 to CBL-Mariner 1.0


13.6    11/15/2024    

Added python2 to CBL-Mariner 1.0


13.7    11/16/2024    

Added python2 to CBL-Mariner 1.0


13.8    11/17/2024    

Added python2 to CBL-Mariner 1.0


13.9    11/18/2024    

Added python2 to CBL-Mariner 1.0


14.0    11/19/2024    

Added python2 to CBL-Mariner 1.0


14.1    11/20/2024    

Added python2 to CBL-Mariner 1.0


14.2    11/21/2024    

Added python2 to CBL-Mariner 1.0


14.3    11/23/2024    

Added python2 to CBL-Mariner 1.0


14.4    11/24/2024    

Added python2 to CBL-Mariner 1.0


14.5    11/25/2024    

Added python2 to CBL-Mariner 1.0


14.6    11/26/2024    

Added python2 to CBL-Mariner 1.0


14.7    11/27/2024    

Added python2 to CBL-Mariner 1.0


14.8    11/28/2024    

Added python2 to CBL-Mariner 1.0


14.9    11/29/2024    

Added python2 to CBL-Mariner 1.0


15.0    11/30/2024    

Added python2 to CBL-Mariner 1.0


15.1    12/01/2024    

Added python2 to CBL-Mariner 1.0


15.2    12/02/2024    

Added python2 to CBL-Mariner 1.0


15.3    12/03/2024    

Added python2 to CBL-Mariner 1.0


15.4    12/04/2024    

Added python2 to CBL-Mariner 1.0


15.5    12/05/2024    

Added python2 to CBL-Mariner 1.0


15.6    12/07/2024    

Added python2 to CBL-Mariner 1.0


15.7    12/08/2024    

Added python2 to CBL-Mariner 1.0


15.8    12/09/2024    

Added python2 to CBL-Mariner 1.0


15.9    12/10/2024    

Added python2 to CBL-Mariner 1.0


16.0    12/11/2024    

Added python2 to CBL-Mariner 1.0


16.1    12/12/2024    

Added python2 to CBL-Mariner 1.0


16.2    12/13/2024    

Added python2 to CBL-Mariner 1.0


16.3    12/14/2024    

Added python2 to CBL-Mariner 1.0


16.4    12/15/2024    

Added python2 to CBL-Mariner 1.0


16.5    12/16/2024    

Added python2 to CBL-Mariner 1.0


16.6    12/17/2024    

Added python2 to CBL-Mariner 1.0


16.7    12/18/2024    

Added python2 to CBL-Mariner 1.0


16.8    12/19/2024    

Added python2 to CBL-Mariner 1.0


16.9    12/20/2024    

Added python2 to CBL-Mariner 1.0


17.0    12/21/2024    

Added python2 to CBL-Mariner 1.0


17.1    12/22/2024    

Added python2 to CBL-Mariner 1.0


17.2    12/23/2024    

Added python2 to CBL-Mariner 1.0


17.3    12/24/2024    

Added python2 to CBL-Mariner 1.0


17.4    12/25/2024    

Added python2 to CBL-Mariner 1.0


17.5    12/26/2024    

Added python2 to CBL-Mariner 1.0


17.6    12/27/2024    

Added python2 to CBL-Mariner 1.0


17.7    12/28/2024    

Added python2 to CBL-Mariner 1.0


17.8    12/29/2024    

Added python2 to CBL-Mariner 1.0


17.9    12/30/2024    

Added python2 to CBL-Mariner 1.0


18.0    12/31/2024    

Added python2 to CBL-Mariner 1.0


18.1    01/01/2025    

Added python2 to CBL-Mariner 1.0


18.2    01/02/2025    

Added python2 to CBL-Mariner 1.0


18.3    01/03/2025    

Added python2 to CBL-Mariner 1.0


18.4    01/04/2025    

Added python2 to CBL-Mariner 1.0


18.5    01/05/2025    

Added python2 to CBL-Mariner 1.0


18.6    01/06/2025    

Added python2 to CBL-Mariner 1.0


18.7    01/07/2025    

Added python2 to CBL-Mariner 1.0


18.8    01/08/2025    

Added python2 to CBL-Mariner 1.0


18.9    01/09/2025    

Added python2 to CBL-Mariner 1.0


19.0    01/10/2025    

Added python2 to CBL-Mariner 1.0


19.1    01/11/2025    

Added python2 to CBL-Mariner 1.0


19.2    01/12/2025    

Added python2 to CBL-Mariner 1.0


19.3    01/13/2025    

Added python2 to CBL-Mariner 1.0


19.4    01/15/2025    

Added python2 to CBL-Mariner 1.0


19.5    01/16/2025    

Added python2 to CBL-Mariner 1.0


19.6    01/17/2025    

Added python2 to CBL-Mariner 1.0


19.7    01/18/2025    

Added python2 to CBL-Mariner 1.0


19.8    01/19/2025    

Added python2 to CBL-Mariner 1.0


19.9    01/20/2025    

Added python2 to CBL-Mariner 1.0


20.0    01/21/2025    

Added python2 to CBL-Mariner 1.0


20.1    01/22/2025    

Added python2 to CBL-Mariner 1.0


20.2    01/23/2025    

Added python2 to CBL-Mariner 1.0


20.3    01/24/2025    

Added python2 to CBL-Mariner 1.0


20.4    01/25/2025    

Added python2 to CBL-Mariner 1.0


20.5    01/27/2025    

Added python2 to CBL-Mariner 1.0


20.6    01/28/2025    

Added python2 to CBL-Mariner 1.0


20.7    01/29/2025    

Added python2 to CBL-Mariner 1.0


20.8    01/30/2025    

Added python2 to CBL-Mariner 1.0


20.9    02/01/2025    

Added python2 to CBL-Mariner 1.0


21.0    02/02/2025    

Added python2 to CBL-Mariner 1.0


21.1    02/03/2025    

Added python2 to CBL-Mariner 1.0


21.2    02/04/2025    

Added python2 to CBL-Mariner 1.0


21.3    02/05/2025    

Added python2 to CBL-Mariner 1.0


21.4    02/07/2025    

Added python2 to CBL-Mariner 1.0


21.5    02/08/2025    

Added python2 to CBL-Mariner 1.0


21.6    02/09/2025    

Added python2 to CBL-Mariner 1.0


21.7    02/10/2025    

Added python2 to CBL-Mariner 1.0


21.8    02/11/2025    

Added python2 to CBL-Mariner 1.0


21.9    02/12/2025    

Added python2 to CBL-Mariner 1.0


22.0    02/13/2025    

Added python2 to CBL-Mariner 1.0


22.1    02/14/2025    

Added python2 to CBL-Mariner 1.0


22.2    02/15/2025    

Added python2 to CBL-Mariner 1.0


22.3    02/16/2025    

Added python2 to CBL-Mariner 1.0


22.4    02/17/2025    

Added python2 to CBL-Mariner 1.0


22.5    02/18/2025    

Added python2 to CBL-Mariner 1.0


22.6    02/19/2025    

Added python2 to CBL-Mariner 1.0


22.7    02/20/2025    

Added python2 to CBL-Mariner 1.0


22.8    02/21/2025    

Added python2 to CBL-Mariner 1.0


22.9    02/22/2025    

Added python2 to CBL-Mariner 1.0


23.0    02/23/2025    

Added python2 to CBL-Mariner 1.0


23.1    02/24/2025    

Added python2 to CBL-Mariner 1.0


23.2    02/25/2025    

Added python2 to CBL-Mariner 1.0


23.3    02/26/2025    

Added python2 to CBL-Mariner 1.0


23.4    02/27/2025    

Added python2 to CBL-Mariner 1.0


23.5    02/28/2025    

Added python2 to CBL-Mariner 1.0


23.6    03/01/2025    

Added python2 to CBL-Mariner 1.0


23.7    03/02/2025    

Added python2 to CBL-Mariner 1.0


23.8    03/03/2025    

Added python2 to CBL-Mariner 1.0


23.9    03/04/2025    

Added python2 to CBL-Mariner 1.0


24.0    03/05/2025    

Added python2 to CBL-Mariner 1.0


24.1    03/06/2025    

Added python2 to CBL-Mariner 1.0


24.2    03/08/2025    

Added python2 to CBL-Mariner 1.0


24.3    03/09/2025    

Added python2 to CBL-Mariner 1.0


24.4    03/10/2025    

Added python2 to CBL-Mariner 1.0


24.5    03/11/2025    

Added python2 to CBL-Mariner 1.0


24.6    03/12/2025    

Added python2 to CBL-Mariner 1.0


24.7    03/13/2025    

Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-9674
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5
Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5
Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-9674 None

CVE-2012-2677 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2012-2677
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/07/2024    

Information published.


1.1    02/27/2025    

Added mysql to Azure Linux 3.0


1.2    02/28/2025    

Added mysql to Azure Linux 3.0


1.3    03/01/2025    

Added mysql to Azure Linux 3.0


1.4    03/02/2025    

Added mysql to Azure Linux 3.0


1.5    03/03/2025    

Added mysql to Azure Linux 3.0


1.6    03/04/2025    

Added mysql to Azure Linux 3.0


1.7    03/05/2025    

Added mysql to Azure Linux 3.0


1.8    03/06/2025    

Added mysql to Azure Linux 3.0


1.9    03/08/2025    

Added mysql to Azure Linux 3.0


2.0    03/09/2025    

Added mysql to Azure Linux 3.0


2.1    03/10/2025    

Added mysql to Azure Linux 3.0


2.2    03/11/2025    

Added mysql to Azure Linux 3.0


2.3    03/12/2025    

Added mysql to Azure Linux 3.0


2.4    03/13/2025    

Added mysql to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2012-2677
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
8.0.40-4
Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
8.0.40-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2012-2677 None

CVE-2012-6708 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2012-6708
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    02/03/2025    

Added slf4j to Azure Linux 3.0


1.2    02/04/2025    

Added slf4j to Azure Linux 3.0


1.3    02/05/2025    

Added slf4j to Azure Linux 3.0


1.4    02/07/2025    

Added slf4j to Azure Linux 3.0


1.5    02/08/2025    

Added slf4j to Azure Linux 3.0


1.6    02/09/2025    

Added slf4j to Azure Linux 3.0


1.7    02/10/2025    

Added slf4j to Azure Linux 3.0


1.8    02/11/2025    

Added slf4j to Azure Linux 3.0


1.9    02/12/2025    

Added slf4j to Azure Linux 3.0


2.0    02/13/2025    

Added slf4j to Azure Linux 3.0


2.1    02/14/2025    

Added slf4j to Azure Linux 3.0


2.2    02/15/2025    

Added slf4j to Azure Linux 3.0


2.3    02/16/2025    

Added slf4j to Azure Linux 3.0


2.4    02/17/2025    

Added slf4j to Azure Linux 3.0


2.5    02/18/2025    

Added slf4j to Azure Linux 3.0


2.6    02/19/2025    

Added slf4j to Azure Linux 3.0


2.7    02/20/2025    

Added slf4j to Azure Linux 3.0


2.8    02/21/2025    

Added slf4j to Azure Linux 3.0


2.9    02/22/2025    

Added slf4j to Azure Linux 3.0


3.0    02/23/2025    

Added slf4j to Azure Linux 3.0


3.1    02/24/2025    

Added slf4j to Azure Linux 3.0


3.2    02/25/2025    

Added slf4j to Azure Linux 3.0


3.3    02/26/2025    

Added slf4j to Azure Linux 3.0


3.4    02/27/2025    

Added slf4j to Azure Linux 3.0


3.5    02/28/2025    

Added slf4j to Azure Linux 3.0


3.6    03/01/2025    

Added slf4j to Azure Linux 3.0


3.7    03/02/2025    

Added slf4j to Azure Linux 3.0


3.8    03/03/2025    

Added slf4j to Azure Linux 3.0


3.9    03/04/2025    

Added slf4j to Azure Linux 3.0


4.0    03/05/2025    

Added slf4j to Azure Linux 3.0


4.1    03/06/2025    

Added slf4j to Azure Linux 3.0


4.2    03/08/2025    

Added slf4j to Azure Linux 3.0


4.3    03/09/2025    

Added slf4j to Azure Linux 3.0


4.4    03/10/2025    

Added slf4j to Azure Linux 3.0


4.5    03/11/2025    

Added slf4j to Azure Linux 3.0


4.6    03/12/2025    

Added slf4j to Azure Linux 3.0


4.7    03/13/2025    

Added slf4j to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2012-6708
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM slf4j (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.0.7-1
Unknown None
Azure Linux 3.0 x64 slf4j (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.0.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2012-6708 None

CVE-2024-52338 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-52338
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    12/13/2024    

Information published.


0.2    12/14/2024    

Information published.


0.3    12/15/2024    

Information published.


0.4    12/16/2024    

Information published.


0.5    12/17/2024    

Information published.


0.6    12/18/2024    

Information published.


0.7    12/19/2024    

Information published.


0.8    12/20/2024    

Information published.


0.9    12/21/2024    

Information published.


1.0    12/22/2024    

Information published.


1.1    12/23/2024    

Added libarrow to Azure Linux 3.0


1.2    12/24/2024    

Added libarrow to Azure Linux 3.0


1.3    12/25/2024    

Added libarrow to Azure Linux 3.0


1.4    12/26/2024    

Added libarrow to Azure Linux 3.0


1.5    12/27/2024    

Added libarrow to Azure Linux 3.0


1.6    12/28/2024    

Added libarrow to Azure Linux 3.0


1.7    12/29/2024    

Added libarrow to Azure Linux 3.0


1.8    12/30/2024    

Added libarrow to Azure Linux 3.0


1.9    12/31/2024    

Added libarrow to Azure Linux 3.0


2.0    01/01/2025    

Added libarrow to Azure Linux 3.0


2.1    01/02/2025    

Added libarrow to Azure Linux 3.0


2.2    01/03/2025    

Added libarrow to Azure Linux 3.0


2.3    01/04/2025    

Added libarrow to Azure Linux 3.0


2.4    01/05/2025    

Added libarrow to Azure Linux 3.0


2.5    01/06/2025    

Added libarrow to Azure Linux 3.0


2.6    01/07/2025    

Added libarrow to Azure Linux 3.0


2.7    01/08/2025    

Added libarrow to Azure Linux 3.0


2.8    01/09/2025    

Added libarrow to Azure Linux 3.0


2.9    01/10/2025    

Added libarrow to Azure Linux 3.0


3.0    01/11/2025    

Added libarrow to Azure Linux 3.0


3.1    01/12/2025    

Added libarrow to Azure Linux 3.0


3.2    01/13/2025    

Added libarrow to Azure Linux 3.0


3.3    01/15/2025    

Added libarrow to Azure Linux 3.0


3.4    01/16/2025    

Added libarrow to Azure Linux 3.0


3.5    01/17/2025    

Added libarrow to Azure Linux 3.0


3.6    01/18/2025    

Added libarrow to Azure Linux 3.0


3.7    01/19/2025    

Added libarrow to Azure Linux 3.0


3.8    01/20/2025    

Added libarrow to Azure Linux 3.0


3.9    01/21/2025    

Added libarrow to Azure Linux 3.0


4.0    01/22/2025    

Added libarrow to Azure Linux 3.0


4.1    01/23/2025    

Added libarrow to Azure Linux 3.0


4.2    01/24/2025    

Added libarrow to Azure Linux 3.0


4.3    01/25/2025    

Added libarrow to Azure Linux 3.0


4.4    01/27/2025    

Added libarrow to Azure Linux 3.0


4.5    01/28/2025    

Added libarrow to Azure Linux 3.0


4.6    01/29/2025    

Added libarrow to Azure Linux 3.0


4.7    01/30/2025    

Added libarrow to Azure Linux 3.0


4.8    02/01/2025    

Added libarrow to Azure Linux 3.0


4.9    02/02/2025    

Added libarrow to Azure Linux 3.0


5.0    02/03/2025    

Added libarrow to Azure Linux 3.0


5.1    02/04/2025    

Added libarrow to Azure Linux 3.0


5.2    02/05/2025    

Added libarrow to Azure Linux 3.0


5.3    02/07/2025    

Added libarrow to Azure Linux 3.0


5.4    02/08/2025    

Added libarrow to Azure Linux 3.0


5.5    02/09/2025    

Added libarrow to Azure Linux 3.0


5.6    02/10/2025    

Added libarrow to Azure Linux 3.0


5.7    02/11/2025    

Added libarrow to Azure Linux 3.0


5.8    02/12/2025    

Added libarrow to Azure Linux 3.0


5.9    02/13/2025    

Added libarrow to Azure Linux 3.0


6.0    02/14/2025    

Added libarrow to Azure Linux 3.0


6.1    02/15/2025    

Added libarrow to Azure Linux 3.0


6.2    02/16/2025    

Added libarrow to Azure Linux 3.0


6.3    02/17/2025    

Added libarrow to Azure Linux 3.0


6.4    02/18/2025    

Added libarrow to Azure Linux 3.0


6.5    02/19/2025    

Added libarrow to Azure Linux 3.0


6.6    02/20/2025    

Added libarrow to Azure Linux 3.0


6.7    02/21/2025    

Added libarrow to Azure Linux 3.0


6.8    02/22/2025    

Added libarrow to Azure Linux 3.0


6.9    02/23/2025    

Added libarrow to Azure Linux 3.0


7.0    02/24/2025    

Added libarrow to Azure Linux 3.0


7.1    02/25/2025    

Added libarrow to Azure Linux 3.0


7.2    02/26/2025    

Added libarrow to Azure Linux 3.0


7.3    02/27/2025    

Added libarrow to Azure Linux 3.0


7.4    02/28/2025    

Added libarrow to Azure Linux 3.0


7.5    03/01/2025    

Added libarrow to Azure Linux 3.0


7.6    03/02/2025    

Added libarrow to Azure Linux 3.0


7.7    03/03/2025    

Added libarrow to Azure Linux 3.0


7.8    03/04/2025    

Added libarrow to Azure Linux 3.0


7.9    03/05/2025    

Added libarrow to Azure Linux 3.0


8.0    03/06/2025    

Added libarrow to Azure Linux 3.0


8.1    03/08/2025    

Added libarrow to Azure Linux 3.0


8.2    03/09/2025    

Added libarrow to Azure Linux 3.0


8.3    03/10/2025    

Added libarrow to Azure Linux 3.0


8.4    03/11/2025    

Added libarrow to Azure Linux 3.0


8.5    03/12/2025    

Added libarrow to Azure Linux 3.0


8.6    03/13/2025    

Added libarrow to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-52338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libarrow (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15.0.0-7
Unknown None
Azure Linux 3.0 x64 libarrow (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15.0.0-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-52338 None

CVE-2024-34062 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-34062
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05/07/2024    

Information published.


1.1    06/30/2024    

Information published.


1.2    08/29/2024    

Information published.


1.3    08/30/2024    

Information published.


1.4    08/31/2024    

Information published.


1.5    09/01/2024    

Information published.


1.6    09/02/2024    

Information published.


1.7    09/03/2024    

Information published.


1.8    09/05/2024    

Information published.


1.9    09/06/2024    

Information published.


2.0    09/07/2024    

Information published.


2.1    09/08/2024    

Information published.


2.2    09/11/2024    

Information published.


2.3    09/12/2024    

Information published.


2.4    09/13/2024    

Information published.


2.5    09/14/2024    

Information published.


2.6    09/15/2024    

Information published.


2.7    09/16/2024    

Information published.


2.8    09/17/2024    

Information published.


2.9    09/18/2024    

Information published.


3.0    09/19/2024    

Information published.


3.1    09/20/2024    

Information published.


3.2    09/21/2024    

Information published.


3.3    09/22/2024    

Information published.


3.4    09/23/2024    

Information published.


3.5    09/24/2024    

Information published.


3.6    09/25/2024    

Information published.


3.7    09/26/2024    

Information published.


3.8    09/27/2024    

Information published.


3.9    09/28/2024    

Information published.


4.0    09/29/2024    

Information published.


4.1    09/30/2024    

Information published.


4.2    10/01/2024    

Information published.


4.3    10/02/2024    

Information published.


4.4    10/03/2024    

Information published.


4.5    10/04/2024    

Information published.


4.6    10/05/2024    

Information published.


4.7    10/06/2024    

Information published.


4.8    10/07/2024    

Information published.


4.9    10/08/2024    

Information published.


5.0    10/09/2024    

Information published.


5.1    10/10/2024    

Information published.


5.2    10/11/2024    

Information published.


5.3    10/12/2024    

Information published.


5.4    10/13/2024    

Information published.


5.5    10/14/2024    

Information published.


5.6    10/15/2024    

Added python-tqdm to CBL-Mariner 2.0


5.7    10/16/2024    

Added python-tqdm to CBL-Mariner 2.0


5.8    10/17/2024    

Added python-tqdm to CBL-Mariner 2.0


5.9    10/18/2024    

Added python-tqdm to CBL-Mariner 2.0


6.0    10/19/2024    

Added python-tqdm to CBL-Mariner 2.0


6.1    10/20/2024    

Added python-tqdm to CBL-Mariner 2.0


6.2    10/21/2024    

Added python-tqdm to CBL-Mariner 2.0


6.3    10/22/2024    

Added python-tqdm to CBL-Mariner 2.0


6.4    10/23/2024    

Added python-tqdm to CBL-Mariner 2.0


6.5    10/24/2024    

Added python-tqdm to CBL-Mariner 2.0


6.6    10/25/2024    

Added python-tqdm to CBL-Mariner 2.0


6.7    10/26/2024    

Added python-tqdm to CBL-Mariner 2.0


6.8    10/27/2024    

Added python-tqdm to CBL-Mariner 2.0


6.9    10/28/2024    

Added python-tqdm to CBL-Mariner 2.0


7.0    10/29/2024    

Added python-tqdm to CBL-Mariner 2.0


7.1    10/30/2024    

Added python-tqdm to CBL-Mariner 2.0


7.2    10/31/2024    

Added python-tqdm to CBL-Mariner 2.0


7.3    11/01/2024    

Added python-tqdm to CBL-Mariner 2.0


7.4    11/02/2024    

Added python-tqdm to CBL-Mariner 2.0


7.5    11/04/2024    

Added python-tqdm to CBL-Mariner 2.0


7.6    11/05/2024    

Added python-tqdm to CBL-Mariner 2.0


7.7    11/06/2024    

Added python-tqdm to CBL-Mariner 2.0


7.8    11/07/2024    

Added python-tqdm to CBL-Mariner 2.0


7.9    11/08/2024    

Added python-tqdm to CBL-Mariner 2.0


8.0    11/09/2024    

Added python-tqdm to CBL-Mariner 2.0


8.1    11/10/2024    

Added python-tqdm to CBL-Mariner 2.0


8.2    11/11/2024    

Added python-tqdm to CBL-Mariner 2.0


8.3    11/12/2024    

Added python-tqdm to CBL-Mariner 2.0


8.4    11/13/2024    

Added python-tqdm to CBL-Mariner 2.0


8.5    11/14/2024    

Added python-tqdm to CBL-Mariner 2.0


8.6    11/15/2024    

Added python-tqdm to CBL-Mariner 2.0


8.7    11/16/2024    

Added python-tqdm to CBL-Mariner 2.0


8.8    11/17/2024    

Added python-tqdm to CBL-Mariner 2.0


8.9    11/18/2024    

Added python-tqdm to CBL-Mariner 2.0


9.0    11/19/2024    

Added python-tqdm to CBL-Mariner 2.0


9.1    11/20/2024    

Added python-tqdm to CBL-Mariner 2.0


9.2    11/21/2024    

Added python-tqdm to CBL-Mariner 2.0


9.3    11/23/2024    

Added python-tqdm to CBL-Mariner 2.0


9.4    11/24/2024    

Added python-tqdm to CBL-Mariner 2.0


9.5    11/25/2024    

Added python-tqdm to CBL-Mariner 2.0


9.6    11/26/2024    

Added python-tqdm to CBL-Mariner 2.0


9.7    11/27/2024    

Added python-tqdm to CBL-Mariner 2.0


9.8    11/28/2024    

Added python-tqdm to CBL-Mariner 2.0


9.9    11/29/2024    

Added python-tqdm to CBL-Mariner 2.0


10.0    11/30/2024    

Added python-tqdm to CBL-Mariner 2.0


10.1    12/01/2024    

Added python-tqdm to CBL-Mariner 2.0


10.2    12/02/2024    

Added python-tqdm to CBL-Mariner 2.0


10.3    12/03/2024    

Added python-tqdm to CBL-Mariner 2.0


10.4    12/04/2024    

Added python-tqdm to CBL-Mariner 2.0


10.5    12/05/2024    

Added python-tqdm to CBL-Mariner 2.0


10.6    12/07/2024    

Added python-tqdm to CBL-Mariner 2.0


10.7    12/08/2024    

Added python-tqdm to CBL-Mariner 2.0


10.8    12/09/2024    

Added python-tqdm to CBL-Mariner 2.0


10.9    12/10/2024    

Added python-tqdm to CBL-Mariner 2.0


11.0    12/11/2024    

Added python-tqdm to CBL-Mariner 2.0


11.1    12/12/2024    

Added python-tqdm to CBL-Mariner 2.0


11.2    12/13/2024    

Added python-tqdm to CBL-Mariner 2.0


11.3    12/14/2024    

Added python-tqdm to CBL-Mariner 2.0


11.4    12/15/2024    

Added python-tqdm to CBL-Mariner 2.0


11.5    12/16/2024    

Added python-tqdm to CBL-Mariner 2.0


11.6    12/17/2024    

Added python-tqdm to CBL-Mariner 2.0


11.7    12/18/2024    

Added python-tqdm to CBL-Mariner 2.0


11.8    12/19/2024    

Added python-tqdm to CBL-Mariner 2.0


11.9    12/20/2024    

Added python-tqdm to CBL-Mariner 2.0


12.0    12/21/2024    

Added python-tqdm to CBL-Mariner 2.0


12.1    12/22/2024    

Added python-tqdm to CBL-Mariner 2.0


12.2    12/23/2024    

Added python-tqdm to CBL-Mariner 2.0


12.3    12/24/2024    

Added python-tqdm to CBL-Mariner 2.0


12.4    12/25/2024    

Added python-tqdm to CBL-Mariner 2.0


12.5    12/26/2024    

Added python-tqdm to CBL-Mariner 2.0


12.6    12/27/2024    

Added python-tqdm to CBL-Mariner 2.0


12.7    12/28/2024    

Added python-tqdm to CBL-Mariner 2.0


12.8    12/29/2024    

Added python-tqdm to CBL-Mariner 2.0


12.9    12/30/2024    

Added python-tqdm to CBL-Mariner 2.0


13.0    12/31/2024    

Added python-tqdm to CBL-Mariner 2.0


13.1    01/01/2025    

Added python-tqdm to CBL-Mariner 2.0


13.2    01/02/2025    

Added python-tqdm to CBL-Mariner 2.0


13.3    01/03/2025    

Added python-tqdm to CBL-Mariner 2.0


13.4    01/04/2025    

Added python-tqdm to CBL-Mariner 2.0


13.5    01/05/2025    

Added python-tqdm to CBL-Mariner 2.0


13.6    01/06/2025    

Added python-tqdm to CBL-Mariner 2.0


13.7    01/07/2025    

Added python-tqdm to CBL-Mariner 2.0


13.8    01/08/2025    

Added python-tqdm to CBL-Mariner 2.0


13.9    01/09/2025    

Added python-tqdm to CBL-Mariner 2.0


14.0    01/10/2025    

Added python-tqdm to CBL-Mariner 2.0


14.1    01/11/2025    

Added python-tqdm to CBL-Mariner 2.0


14.2    01/12/2025    

Added python-tqdm to CBL-Mariner 2.0


14.3    01/13/2025    

Added python-tqdm to CBL-Mariner 2.0


14.4    01/15/2025    

Added python-tqdm to CBL-Mariner 2.0


14.5    01/16/2025    

Added python-tqdm to CBL-Mariner 2.0


14.6    01/17/2025    

Added python-tqdm to CBL-Mariner 2.0


14.7    01/18/2025    

Added python-tqdm to CBL-Mariner 2.0


14.8    01/19/2025    

Added python-tqdm to CBL-Mariner 2.0


14.9    01/20/2025    

Added python-tqdm to CBL-Mariner 2.0


15.0    01/21/2025    

Added python-tqdm to CBL-Mariner 2.0


15.1    01/22/2025    

Added python-tqdm to CBL-Mariner 2.0


15.2    01/23/2025    

Added python-tqdm to CBL-Mariner 2.0


15.3    01/24/2025    

Added python-tqdm to CBL-Mariner 2.0


15.4    01/25/2025    

Added python-tqdm to CBL-Mariner 2.0


15.5    01/27/2025    

Added python-tqdm to CBL-Mariner 2.0


15.6    01/28/2025    

Added python-tqdm to CBL-Mariner 2.0


15.7    01/29/2025    

Added python-tqdm to CBL-Mariner 2.0


15.8    01/30/2025    

Added python-tqdm to CBL-Mariner 2.0


15.9    02/01/2025    

Added python-tqdm to CBL-Mariner 2.0


16.0    02/02/2025    

Added python-tqdm to CBL-Mariner 2.0


16.1    02/03/2025    

Added python-tqdm to CBL-Mariner 2.0


16.2    02/04/2025    

Added python-tqdm to CBL-Mariner 2.0


16.3    02/05/2025    

Added python-tqdm to CBL-Mariner 2.0


16.4    02/07/2025    

Added python-tqdm to CBL-Mariner 2.0


16.5    02/08/2025    

Added python-tqdm to CBL-Mariner 2.0


16.6    02/09/2025    

Added python-tqdm to CBL-Mariner 2.0


16.7    02/10/2025    

Added python-tqdm to CBL-Mariner 2.0


16.8    02/11/2025    

Added python-tqdm to CBL-Mariner 2.0


16.9    02/12/2025    

Added python-tqdm to CBL-Mariner 2.0


17.0    02/13/2025    

Added python-tqdm to CBL-Mariner 2.0


17.1    02/14/2025    

Added python-tqdm to CBL-Mariner 2.0


17.2    02/15/2025    

Added python-tqdm to CBL-Mariner 2.0


17.3    02/16/2025    

Added python-tqdm to CBL-Mariner 2.0


17.4    02/17/2025    

Added python-tqdm to CBL-Mariner 2.0


17.5    02/18/2025    

Added python-tqdm to CBL-Mariner 2.0


17.6    02/19/2025    

Added python-tqdm to CBL-Mariner 2.0


17.7    02/20/2025    

Added python-tqdm to CBL-Mariner 2.0


17.8    02/21/2025    

Added python-tqdm to CBL-Mariner 2.0


17.9    02/22/2025    

Added python-tqdm to CBL-Mariner 2.0


18.0    02/23/2025    

Added python-tqdm to CBL-Mariner 2.0


18.1    02/24/2025    

Added python-tqdm to CBL-Mariner 2.0


18.2    02/25/2025    

Added python-tqdm to CBL-Mariner 2.0


18.3    02/26/2025    

Added python-tqdm to CBL-Mariner 2.0


18.4    02/27/2025    

Added python-tqdm to CBL-Mariner 2.0


18.5    02/28/2025    

Added python-tqdm to CBL-Mariner 2.0


18.6    03/01/2025    

Added python-tqdm to CBL-Mariner 2.0


18.7    03/02/2025    

Added python-tqdm to CBL-Mariner 2.0


18.8    03/03/2025    

Added python-tqdm to CBL-Mariner 2.0


18.9    03/04/2025    

Added python-tqdm to CBL-Mariner 2.0


19.0    03/05/2025    

Added python-tqdm to CBL-Mariner 2.0


19.1    03/06/2025    

Added python-tqdm to CBL-Mariner 2.0


19.2    03/08/2025    

Added python-tqdm to CBL-Mariner 2.0


19.3    03/09/2025    

Added python-tqdm to CBL-Mariner 2.0


19.4    03/10/2025    

Added python-tqdm to CBL-Mariner 2.0


19.5    03/11/2025    

Added python-tqdm to CBL-Mariner 2.0


19.6    03/12/2025    

Added python-tqdm to CBL-Mariner 2.0


19.7    03/13/2025    

Added python-tqdm to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-34062
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Unknown Unknown None
CBL Mariner 2.0 ARM python-tqdm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.63.1-3
Unknown None
CBL Mariner 2.0 x64 python-tqdm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.63.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-34062 None

CVE-2024-32020 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32020
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.9/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05/17/2024    

Information published.


1.1    06/30/2024    

Information published.


1.2    08/29/2024    

Information published.


1.3    08/30/2024    

Information published.


1.4    08/31/2024    

Information published.


1.5    09/01/2024    

Information published.


1.6    09/02/2024    

Information published.


1.7    09/03/2024    

Information published.


1.8    09/05/2024    

Information published.


1.9    09/06/2024    

Information published.


2.0    09/07/2024    

Information published.


2.1    09/08/2024    

Information published.


2.2    09/11/2024    

Information published.


2.3    09/12/2024    

Information published.


2.4    09/13/2024    

Information published.


2.5    09/14/2024    

Information published.


2.6    09/15/2024    

Information published.


2.7    09/16/2024    

Information published.


2.8    09/17/2024    

Information published.


2.9    09/18/2024    

Information published.


3.0    09/19/2024    

Information published.


3.1    09/20/2024    

Information published.


3.2    09/21/2024    

Information published.


3.3    09/22/2024    

Information published.


3.4    09/23/2024    

Information published.


3.5    09/24/2024    

Information published.


3.6    09/25/2024    

Information published.


3.7    09/26/2024    

Information published.


3.8    09/27/2024    

Information published.


3.9    09/28/2024    

Information published.


4.0    09/29/2024    

Information published.


4.1    09/30/2024    

Information published.


4.2    10/01/2024    

Information published.


4.3    10/02/2024    

Information published.


4.4    10/03/2024    

Information published.


4.5    10/04/2024    

Information published.


4.6    10/05/2024    

Information published.


4.7    10/06/2024    

Information published.


4.8    10/07/2024    

Information published.


4.9    10/08/2024    

Information published.


5.0    10/09/2024    

Information published.


5.1    10/10/2024    

Information published.


5.2    10/11/2024    

Information published.


5.3    10/12/2024    

Information published.


5.4    10/13/2024    

Information published.


5.5    10/14/2024    

Information published.


5.6    10/15/2024    

Added git to CBL-Mariner 2.0


5.7    10/16/2024    

Added git to CBL-Mariner 2.0


5.8    10/17/2024    

Added git to CBL-Mariner 2.0


5.9    10/18/2024    

Added git to CBL-Mariner 2.0


6.0    10/19/2024    

Added git to CBL-Mariner 2.0


6.1    10/20/2024    

Added git to CBL-Mariner 2.0


6.2    10/21/2024    

Added git to CBL-Mariner 2.0


6.3    10/22/2024    

Added git to CBL-Mariner 2.0


6.4    10/23/2024    

Added git to CBL-Mariner 2.0


6.5    10/24/2024    

Added git to CBL-Mariner 2.0


6.6    10/25/2024    

Added git to CBL-Mariner 2.0


6.7    10/26/2024    

Added git to CBL-Mariner 2.0


6.8    10/27/2024    

Added git to CBL-Mariner 2.0


6.9    10/28/2024    

Added git to CBL-Mariner 2.0


7.0    10/29/2024    

Added git to CBL-Mariner 2.0


7.1    10/30/2024    

Added git to CBL-Mariner 2.0


7.2    10/31/2024    

Added git to CBL-Mariner 2.0


7.3    11/01/2024    

Added git to CBL-Mariner 2.0


7.4    11/02/2024    

Added git to CBL-Mariner 2.0


7.5    11/04/2024    

Added git to CBL-Mariner 2.0


7.6    11/05/2024    

Added git to CBL-Mariner 2.0


7.7    11/06/2024    

Added git to CBL-Mariner 2.0


7.8    11/07/2024    

Added git to CBL-Mariner 2.0


7.9    11/08/2024    

Added git to CBL-Mariner 2.0


8.0    11/09/2024    

Added git to CBL-Mariner 2.0


8.1    11/10/2024    

Added git to CBL-Mariner 2.0


8.2    11/11/2024    

Added git to CBL-Mariner 2.0


8.3    11/12/2024    

Added git to CBL-Mariner 2.0


8.4    11/13/2024    

Added git to CBL-Mariner 2.0


8.5    11/14/2024    

Added git to CBL-Mariner 2.0


8.6    11/15/2024    

Added git to CBL-Mariner 2.0


8.7    11/16/2024    

Added git to CBL-Mariner 2.0


8.8    11/17/2024    

Added git to CBL-Mariner 2.0


8.9    11/18/2024    

Added git to CBL-Mariner 2.0


9.0    11/19/2024    

Added git to CBL-Mariner 2.0


9.1    11/20/2024    

Added git to CBL-Mariner 2.0


9.2    11/21/2024    

Added git to CBL-Mariner 2.0


9.3    11/23/2024    

Added git to CBL-Mariner 2.0


9.4    11/24/2024    

Added git to CBL-Mariner 2.0


9.5    11/25/2024    

Added git to CBL-Mariner 2.0


9.6    11/26/2024    

Added git to CBL-Mariner 2.0


9.7    11/27/2024    

Added git to CBL-Mariner 2.0


9.8    11/28/2024    

Added git to CBL-Mariner 2.0


9.9    11/29/2024    

Added git to CBL-Mariner 2.0


10.0    11/30/2024    

Added git to CBL-Mariner 2.0


10.1    12/01/2024    

Added git to CBL-Mariner 2.0


10.2    12/02/2024    

Added git to CBL-Mariner 2.0


10.3    12/03/2024    

Added git to CBL-Mariner 2.0


10.4    12/04/2024    

Added git to CBL-Mariner 2.0


10.5    12/05/2024    

Added git to CBL-Mariner 2.0


10.6    12/07/2024    

Added git to CBL-Mariner 2.0


10.7    12/08/2024    

Added git to CBL-Mariner 2.0


10.8    12/09/2024    

Added git to CBL-Mariner 2.0


10.9    12/10/2024    

Added git to CBL-Mariner 2.0


11.0    12/11/2024    

Added git to CBL-Mariner 2.0


11.1    12/12/2024    

Added git to CBL-Mariner 2.0


11.2    12/13/2024    

Added git to CBL-Mariner 2.0


11.3    12/14/2024    

Added git to CBL-Mariner 2.0


11.4    12/15/2024    

Added git to CBL-Mariner 2.0


11.5    12/16/2024    

Added git to CBL-Mariner 2.0


11.6    12/17/2024    

Added git to CBL-Mariner 2.0


11.7    12/18/2024    

Added git to CBL-Mariner 2.0


11.8    12/19/2024    

Added git to CBL-Mariner 2.0


11.9    12/20/2024    

Added git to CBL-Mariner 2.0


12.0    12/21/2024    

Added git to CBL-Mariner 2.0


12.1    12/22/2024    

Added git to CBL-Mariner 2.0


12.2    12/23/2024    

Added git to CBL-Mariner 2.0


12.3    12/24/2024    

Added git to CBL-Mariner 2.0


12.4    12/25/2024    

Added git to CBL-Mariner 2.0


12.5    12/26/2024    

Added git to CBL-Mariner 2.0


12.6    12/27/2024    

Added git to CBL-Mariner 2.0


12.7    12/28/2024    

Added git to CBL-Mariner 2.0


12.8    12/29/2024    

Added git to CBL-Mariner 2.0


12.9    12/30/2024    

Added git to CBL-Mariner 2.0


13.0    12/31/2024    

Added git to CBL-Mariner 2.0


13.1    01/01/2025    

Added git to CBL-Mariner 2.0


13.2    01/02/2025    

Added git to CBL-Mariner 2.0


13.3    01/03/2025    

Added git to CBL-Mariner 2.0


13.4    01/04/2025    

Added git to CBL-Mariner 2.0


13.5    01/05/2025    

Added git to CBL-Mariner 2.0


13.6    01/06/2025    

Added git to CBL-Mariner 2.0


13.7    01/07/2025    

Added git to CBL-Mariner 2.0


13.8    01/08/2025    

Added git to CBL-Mariner 2.0


13.9    01/09/2025    

Added git to CBL-Mariner 2.0


14.0    01/10/2025    

Added git to CBL-Mariner 2.0


14.1    01/11/2025    

Added git to CBL-Mariner 2.0


14.2    01/12/2025    

Added git to CBL-Mariner 2.0


14.3    01/13/2025    

Added git to CBL-Mariner 2.0


14.4    01/15/2025    

Added git to CBL-Mariner 2.0


14.5    01/16/2025    

Added git to CBL-Mariner 2.0


14.6    01/17/2025    

Added git to CBL-Mariner 2.0


14.7    01/18/2025    

Added git to CBL-Mariner 2.0


14.8    01/19/2025    

Added git to CBL-Mariner 2.0


14.9    01/20/2025    

Added git to CBL-Mariner 2.0


15.0    01/21/2025    

Added git to CBL-Mariner 2.0


15.1    01/22/2025    

Added git to CBL-Mariner 2.0


15.2    01/23/2025    

Added git to CBL-Mariner 2.0


15.3    01/24/2025    

Added git to CBL-Mariner 2.0


15.4    01/25/2025    

Added git to CBL-Mariner 2.0


15.5    01/27/2025    

Added git to CBL-Mariner 2.0


15.6    01/28/2025    

Added git to CBL-Mariner 2.0


15.7    01/29/2025    

Added git to CBL-Mariner 2.0


15.8    01/30/2025    

Added git to CBL-Mariner 2.0


15.9    02/01/2025    

Added git to CBL-Mariner 2.0


16.0    02/02/2025    

Added git to CBL-Mariner 2.0


16.1    02/03/2025    

Added git to CBL-Mariner 2.0


16.2    02/04/2025    

Added git to CBL-Mariner 2.0


16.3    02/05/2025    

Added git to CBL-Mariner 2.0


16.4    02/07/2025    

Added git to CBL-Mariner 2.0


16.5    02/08/2025    

Added git to CBL-Mariner 2.0


16.6    02/09/2025    

Added git to CBL-Mariner 2.0


16.7    02/10/2025    

Added git to CBL-Mariner 2.0


16.8    02/11/2025    

Added git to CBL-Mariner 2.0


16.9    02/12/2025    

Added git to CBL-Mariner 2.0


17.0    02/13/2025    

Added git to CBL-Mariner 2.0


17.1    02/14/2025    

Added git to CBL-Mariner 2.0


17.2    02/15/2025    

Added git to CBL-Mariner 2.0


17.3    02/16/2025    

Added git to CBL-Mariner 2.0


17.4    02/17/2025    

Added git to CBL-Mariner 2.0


17.5    02/18/2025    

Added git to CBL-Mariner 2.0


17.6    02/19/2025    

Added git to CBL-Mariner 2.0


17.7    02/20/2025    

Added git to CBL-Mariner 2.0


17.8    02/21/2025    

Added git to CBL-Mariner 2.0


17.9    02/22/2025    

Added git to CBL-Mariner 2.0


18.0    02/23/2025    

Added git to CBL-Mariner 2.0


18.1    02/24/2025    

Added git to CBL-Mariner 2.0


18.2    02/25/2025    

Added git to CBL-Mariner 2.0


18.3    02/26/2025    

Added git to CBL-Mariner 2.0


18.4    02/27/2025    

Added git to CBL-Mariner 2.0


18.5    02/28/2025    

Added git to CBL-Mariner 2.0


18.6    03/01/2025    

Added git to CBL-Mariner 2.0


18.7    03/02/2025    

Added git to CBL-Mariner 2.0


18.8    03/03/2025    

Added git to CBL-Mariner 2.0


18.9    03/04/2025    

Added git to CBL-Mariner 2.0


19.0    03/05/2025    

Added git to CBL-Mariner 2.0


19.1    03/06/2025    

Added git to CBL-Mariner 2.0


19.2    03/08/2025    

Added git to CBL-Mariner 2.0


19.3    03/09/2025    

Added git to CBL-Mariner 2.0


19.4    03/10/2025    

Added git to CBL-Mariner 2.0


19.5    03/11/2025    

Added git to CBL-Mariner 2.0


19.6    03/12/2025    

Added git to CBL-Mariner 2.0


19.7    03/13/2025    

Added git to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32020
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Unknown Unknown None
CBL Mariner 2.0 ARM git (CBL-Mariner) Unknown Unknown Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
2.39.4-1
Unknown None
CBL Mariner 2.0 x64 git (CBL-Mariner) Unknown Unknown Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
2.39.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32020 None

CVE-2024-7383 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7383
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    10/15/2024    

Added libnbd to CBL-Mariner 2.0


1.2    10/16/2024    

Added libnbd to CBL-Mariner 2.0


1.3    10/17/2024    

Added libnbd to CBL-Mariner 2.0


1.4    10/18/2024    

Added libnbd to CBL-Mariner 2.0


1.5    10/19/2024    

Added libnbd to CBL-Mariner 2.0


1.6    10/20/2024    

Added libnbd to CBL-Mariner 2.0


1.7    10/21/2024    

Added libnbd to CBL-Mariner 2.0


1.8    10/22/2024    

Added libnbd to CBL-Mariner 2.0


1.9    10/23/2024    

Added libnbd to CBL-Mariner 2.0


2.0    10/24/2024    

Added libnbd to CBL-Mariner 2.0


2.1    10/25/2024    

Added libnbd to CBL-Mariner 2.0


2.2    10/26/2024    

Added libnbd to CBL-Mariner 2.0


2.3    10/27/2024    

Added libnbd to CBL-Mariner 2.0


2.4    10/28/2024    

Added libnbd to CBL-Mariner 2.0


2.5    10/29/2024    

Added libnbd to CBL-Mariner 2.0


2.6    10/30/2024    

Added libnbd to CBL-Mariner 2.0


2.7    10/31/2024    

Added libnbd to CBL-Mariner 2.0


2.8    11/01/2024    

Added libnbd to CBL-Mariner 2.0


2.9    11/02/2024    

Added libnbd to CBL-Mariner 2.0


3.0    11/04/2024    

Added libnbd to CBL-Mariner 2.0


3.1    11/05/2024    

Added libnbd to CBL-Mariner 2.0


3.2    11/06/2024    

Added libnbd to CBL-Mariner 2.0


3.3    11/07/2024    

Added libnbd to CBL-Mariner 2.0


3.4    11/08/2024    

Added libnbd to CBL-Mariner 2.0


3.5    11/09/2024    

Added libnbd to CBL-Mariner 2.0


3.6    11/10/2024    

Added libnbd to CBL-Mariner 2.0


3.7    11/11/2024    

Added libnbd to CBL-Mariner 2.0


3.8    11/12/2024    

Added libnbd to CBL-Mariner 2.0


3.9    11/13/2024    

Added libnbd to CBL-Mariner 2.0


4.0    11/14/2024    

Added libnbd to CBL-Mariner 2.0


4.1    11/15/2024    

Added libnbd to CBL-Mariner 2.0


4.2    11/16/2024    

Added libnbd to CBL-Mariner 2.0


4.3    11/17/2024    

Added libnbd to CBL-Mariner 2.0


4.4    11/18/2024    

Added libnbd to CBL-Mariner 2.0


4.5    11/19/2024    

Added libnbd to CBL-Mariner 2.0


4.6    11/20/2024    

Added libnbd to CBL-Mariner 2.0


4.7    11/21/2024    

Added libnbd to CBL-Mariner 2.0


4.8    11/23/2024    

Added libnbd to CBL-Mariner 2.0


4.9    11/24/2024    

Added libnbd to CBL-Mariner 2.0


5.0    11/25/2024    

Added libnbd to CBL-Mariner 2.0


5.1    11/26/2024    

Added libnbd to CBL-Mariner 2.0


5.2    11/27/2024    

Added libnbd to CBL-Mariner 2.0


5.3    11/28/2024    

Added libnbd to CBL-Mariner 2.0


5.4    11/29/2024    

Added libnbd to CBL-Mariner 2.0


5.5    11/30/2024    

Added libnbd to CBL-Mariner 2.0


5.6    12/01/2024    

Added libnbd to CBL-Mariner 2.0


5.7    12/02/2024    

Added libnbd to CBL-Mariner 2.0


5.8    12/03/2024    

Added libnbd to CBL-Mariner 2.0


5.9    12/04/2024    

Added libnbd to CBL-Mariner 2.0


6.0    12/05/2024    

Added libnbd to CBL-Mariner 2.0


6.1    12/07/2024    

Added libnbd to CBL-Mariner 2.0


6.2    12/08/2024    

Added libnbd to CBL-Mariner 2.0


6.3    12/09/2024    

Added libnbd to CBL-Mariner 2.0


6.4    12/10/2024    

Added libnbd to CBL-Mariner 2.0


6.5    12/11/2024    

Added libnbd to CBL-Mariner 2.0


6.6    12/12/2024    

Added libnbd to CBL-Mariner 2.0


6.7    12/13/2024    

Added libnbd to CBL-Mariner 2.0


6.8    12/14/2024    

Added libnbd to CBL-Mariner 2.0


6.9    12/15/2024    

Added libnbd to CBL-Mariner 2.0


7.0    12/16/2024    

Added libnbd to CBL-Mariner 2.0


7.1    12/17/2024    

Added libnbd to CBL-Mariner 2.0


7.2    12/18/2024    

Added libnbd to CBL-Mariner 2.0


7.3    12/19/2024    

Added libnbd to CBL-Mariner 2.0


7.4    12/20/2024    

Added libnbd to CBL-Mariner 2.0


7.5    12/21/2024    

Added libnbd to CBL-Mariner 2.0


7.6    12/22/2024    

Added libnbd to CBL-Mariner 2.0


7.7    12/23/2024    

Added libnbd to CBL-Mariner 2.0


7.8    12/24/2024    

Added libnbd to CBL-Mariner 2.0


7.9    12/25/2024    

Added libnbd to CBL-Mariner 2.0


8.0    12/26/2024    

Added libnbd to CBL-Mariner 2.0


8.1    12/27/2024    

Added libnbd to CBL-Mariner 2.0


8.2    12/28/2024    

Added libnbd to CBL-Mariner 2.0


8.3    12/29/2024    

Added libnbd to CBL-Mariner 2.0


8.4    12/30/2024    

Added libnbd to CBL-Mariner 2.0


8.5    12/31/2024    

Added libnbd to CBL-Mariner 2.0


8.6    01/01/2025    

Added libnbd to CBL-Mariner 2.0


8.7    01/02/2025    

Added libnbd to CBL-Mariner 2.0


8.8    01/03/2025    

Added libnbd to CBL-Mariner 2.0


8.9    01/04/2025    

Added libnbd to CBL-Mariner 2.0


9.0    01/05/2025    

Added libnbd to CBL-Mariner 2.0


9.1    01/06/2025    

Added libnbd to CBL-Mariner 2.0


9.2    01/07/2025    

Added libnbd to CBL-Mariner 2.0


9.3    01/08/2025    

Added libnbd to CBL-Mariner 2.0


9.4    01/09/2025    

Added libnbd to CBL-Mariner 2.0


9.5    01/10/2025    

Added libnbd to CBL-Mariner 2.0


9.6    01/11/2025    

Added libnbd to CBL-Mariner 2.0


9.7    01/12/2025    

Added libnbd to CBL-Mariner 2.0


9.8    01/13/2025    

Added libnbd to CBL-Mariner 2.0


9.9    01/15/2025    

Added libnbd to CBL-Mariner 2.0


10.0    01/16/2025    

Added libnbd to CBL-Mariner 2.0


10.1    01/17/2025    

Added libnbd to CBL-Mariner 2.0


10.2    01/18/2025    

Added libnbd to CBL-Mariner 2.0


10.3    01/19/2025    

Added libnbd to CBL-Mariner 2.0


10.4    01/20/2025    

Added libnbd to CBL-Mariner 2.0


10.5    01/21/2025    

Added libnbd to CBL-Mariner 2.0


10.6    01/22/2025    

Added libnbd to CBL-Mariner 2.0


10.7    01/23/2025    

Added libnbd to CBL-Mariner 2.0


10.8    01/24/2025    

Added libnbd to CBL-Mariner 2.0


10.9    01/25/2025    

Added libnbd to CBL-Mariner 2.0


11.0    01/27/2025    

Added libnbd to CBL-Mariner 2.0


11.1    01/28/2025    

Added libnbd to CBL-Mariner 2.0


11.2    01/29/2025    

Added libnbd to CBL-Mariner 2.0


11.3    01/30/2025    

Added libnbd to CBL-Mariner 2.0


11.4    02/01/2025    

Added libnbd to CBL-Mariner 2.0


11.5    02/02/2025    

Added libnbd to CBL-Mariner 2.0


11.6    02/03/2025    

Added libnbd to CBL-Mariner 2.0


11.7    02/04/2025    

Added libnbd to CBL-Mariner 2.0


11.8    02/05/2025    

Added libnbd to CBL-Mariner 2.0


11.9    02/07/2025    

Added libnbd to CBL-Mariner 2.0


12.0    02/08/2025    

Added libnbd to CBL-Mariner 2.0


12.1    02/09/2025    

Added libnbd to CBL-Mariner 2.0


12.2    02/10/2025    

Added libnbd to CBL-Mariner 2.0


12.3    02/11/2025    

Added libnbd to CBL-Mariner 2.0


12.4    02/12/2025    

Added libnbd to CBL-Mariner 2.0


12.5    02/13/2025    

Added libnbd to CBL-Mariner 2.0


12.6    02/14/2025    

Added libnbd to CBL-Mariner 2.0


12.7    02/15/2025    

Added libnbd to CBL-Mariner 2.0


12.8    02/16/2025    

Added libnbd to CBL-Mariner 2.0


12.9    02/17/2025    

Added libnbd to CBL-Mariner 2.0


13.0    02/18/2025    

Added libnbd to CBL-Mariner 2.0


13.1    02/19/2025    

Added libnbd to CBL-Mariner 2.0


13.2    02/20/2025    

Added libnbd to CBL-Mariner 2.0


13.3    02/21/2025    

Added libnbd to CBL-Mariner 2.0


13.4    02/22/2025    

Added libnbd to CBL-Mariner 2.0


13.5    02/23/2025    

Added libnbd to CBL-Mariner 2.0


13.6    02/24/2025    

Added libnbd to CBL-Mariner 2.0


13.7    02/25/2025    

Added libnbd to CBL-Mariner 2.0


13.8    02/26/2025    

Added libnbd to CBL-Mariner 2.0


13.9    02/27/2025    

Added libnbd to CBL-Mariner 2.0


14.0    02/28/2025    

Added libnbd to CBL-Mariner 2.0


14.1    03/01/2025    

Added libnbd to CBL-Mariner 2.0


14.2    03/02/2025    

Added libnbd to CBL-Mariner 2.0


14.3    03/03/2025    

Added libnbd to CBL-Mariner 2.0


14.4    03/04/2025    

Added libnbd to CBL-Mariner 2.0


14.5    03/05/2025    

Added libnbd to CBL-Mariner 2.0


14.6    03/06/2025    

Added libnbd to CBL-Mariner 2.0


14.7    03/08/2025    

Added libnbd to CBL-Mariner 2.0


14.8    03/09/2025    

Added libnbd to CBL-Mariner 2.0


14.9    03/10/2025    

Added libnbd to CBL-Mariner 2.0


15.0    03/11/2025    

Added libnbd to CBL-Mariner 2.0


15.1    03/12/2025    

Added libnbd to CBL-Mariner 2.0


15.2    03/14/2025    

Added libnbd to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7383
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Unknown Unknown None
CBL Mariner 2.0 ARM libnbd (CBL-Mariner) Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1.12.1-4
Unknown None
CBL Mariner 2.0 x64 libnbd (CBL-Mariner) Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1.12.1-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7383 None

CVE-2022-40898 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-40898
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/13/2024    

Information published.


1.1    09/14/2024    

Information published.


1.2    09/15/2024    

Information published.


1.3    09/16/2024    

Information published.


1.4    09/17/2024    

Information published.


1.5    09/18/2024    

Information published.


1.6    09/19/2024    

Information published.


1.7    09/20/2024    

Information published.


1.8    09/21/2024    

Information published.


1.9    09/22/2024    

Information published.


2.0    09/23/2024    

Information published.


2.1    09/24/2024    

Information published.


2.2    09/25/2024    

Information published.


2.3    09/26/2024    

Information published.


2.4    09/27/2024    

Information published.


2.5    09/28/2024    

Information published.


2.6    09/29/2024    

Information published.


2.7    09/30/2024    

Information published.


2.8    10/01/2024    

Information published.


2.9    10/02/2024    

Information published.


3.0    10/03/2024    

Information published.


3.1    10/04/2024    

Information published.


3.2    10/05/2024    

Information published.


3.3    10/06/2024    

Information published.


3.4    10/07/2024    

Information published.


3.5    10/09/2024    

Information published.


3.6    10/10/2024    

Information published.


3.7    10/11/2024    

Information published.


3.8    10/12/2024    

Information published.


3.9    10/13/2024    

Information published.


4.0    10/14/2024    

Information published.


4.1    10/15/2024    

Added python-wheel to CBL-Mariner 2.0


4.2    10/16/2024    

Added python-wheel to CBL-Mariner 2.0


4.3    10/17/2024    

Added python-wheel to CBL-Mariner 2.0


4.4    10/18/2024    

Added python-wheel to CBL-Mariner 2.0


4.5    10/19/2024    

Added python-wheel to CBL-Mariner 2.0


4.6    10/20/2024    

Added python-wheel to CBL-Mariner 2.0


4.7    10/21/2024    

Added python-wheel to CBL-Mariner 2.0


4.8    10/22/2024    

Added python-wheel to CBL-Mariner 2.0


4.9    10/23/2024    

Added python-wheel to CBL-Mariner 2.0


5.0    10/24/2024    

Added python-wheel to CBL-Mariner 2.0


5.1    10/25/2024    

Added python-wheel to CBL-Mariner 2.0


5.2    10/26/2024    

Added python-wheel to CBL-Mariner 2.0


5.3    10/27/2024    

Added python-wheel to CBL-Mariner 2.0


5.4    10/28/2024    

Added python-wheel to CBL-Mariner 2.0


5.5    10/29/2024    

Added python-wheel to CBL-Mariner 2.0


5.6    10/30/2024    

Added python-wheel to CBL-Mariner 2.0


5.7    10/31/2024    

Added python-wheel to CBL-Mariner 2.0


5.8    11/01/2024    

Added python-wheel to CBL-Mariner 2.0


5.9    11/02/2024    

Added python-wheel to CBL-Mariner 2.0


6.0    11/04/2024    

Added python-wheel to CBL-Mariner 2.0


6.1    11/05/2024    

Added python-wheel to CBL-Mariner 2.0


6.2    11/06/2024    

Added python-wheel to CBL-Mariner 2.0


6.3    11/07/2024    

Added python-wheel to CBL-Mariner 2.0


6.4    11/08/2024    

Added python-wheel to CBL-Mariner 2.0


6.5    11/09/2024    

Added python-wheel to CBL-Mariner 2.0


6.6    11/10/2024    

Added python-wheel to CBL-Mariner 2.0


6.7    11/11/2024    

Added python-wheel to CBL-Mariner 2.0


6.8    11/12/2024    

Added python-wheel to CBL-Mariner 2.0


6.9    11/13/2024    

Added python-wheel to CBL-Mariner 2.0


7.0    11/14/2024    

Added python-wheel to CBL-Mariner 2.0


7.1    11/15/2024    

Added python-wheel to CBL-Mariner 2.0


7.2    11/16/2024    

Added python-wheel to CBL-Mariner 2.0


7.3    11/17/2024    

Added python-wheel to CBL-Mariner 2.0


7.4    11/18/2024    

Added python-wheel to CBL-Mariner 2.0


7.5    11/19/2024    

Added python-wheel to CBL-Mariner 2.0


7.6    11/20/2024    

Added python-wheel to CBL-Mariner 2.0


7.7    11/21/2024    

Added python-wheel to CBL-Mariner 2.0


7.8    11/23/2024    

Added python-wheel to CBL-Mariner 2.0


7.9    11/24/2024    

Added python-wheel to CBL-Mariner 2.0


8.0    11/25/2024    

Added python-wheel to CBL-Mariner 2.0


8.1    11/26/2024    

Added python-wheel to CBL-Mariner 2.0


8.2    11/27/2024    

Added python-wheel to CBL-Mariner 2.0


8.3    11/28/2024    

Added python-wheel to CBL-Mariner 2.0


8.4    11/29/2024    

Added python-wheel to CBL-Mariner 2.0


8.5    11/30/2024    

Added python-wheel to CBL-Mariner 2.0


8.6    12/01/2024    

Added python-wheel to CBL-Mariner 2.0


8.7    12/02/2024    

Added python-wheel to CBL-Mariner 2.0


8.8    12/03/2024    

Added python-wheel to CBL-Mariner 2.0


8.9    12/04/2024    

Added python-wheel to CBL-Mariner 2.0


9.0    12/05/2024    

Added python-wheel to CBL-Mariner 2.0


9.1    12/07/2024    

Added python-wheel to CBL-Mariner 2.0


9.2    12/08/2024    

Added python-wheel to CBL-Mariner 2.0


9.3    12/09/2024    

Added python-wheel to CBL-Mariner 2.0


9.4    12/10/2024    

Added python-wheel to CBL-Mariner 2.0


9.5    12/11/2024    

Added python-wheel to CBL-Mariner 2.0


9.6    12/12/2024    

Added python-wheel to CBL-Mariner 2.0


9.7    12/13/2024    

Added python-wheel to CBL-Mariner 2.0


9.8    12/14/2024    

Added python-wheel to CBL-Mariner 2.0


9.9    12/15/2024    

Added python-wheel to CBL-Mariner 2.0


10.0    12/16/2024    

Added python-wheel to CBL-Mariner 2.0


10.1    12/17/2024    

Added python-wheel to CBL-Mariner 2.0


10.2    12/18/2024    

Added python-wheel to CBL-Mariner 2.0


10.3    12/19/2024    

Added python-wheel to CBL-Mariner 2.0


10.4    12/20/2024    

Added python-wheel to CBL-Mariner 2.0


10.5    12/21/2024    

Added python-wheel to CBL-Mariner 2.0


10.6    12/22/2024    

Added python-wheel to CBL-Mariner 2.0


10.7    12/23/2024    

Added python-wheel to CBL-Mariner 2.0


10.8    12/24/2024    

Added python-wheel to CBL-Mariner 2.0


10.9    12/25/2024    

Added python-wheel to CBL-Mariner 2.0


11.0    12/26/2024    

Added python-wheel to CBL-Mariner 2.0


11.1    12/27/2024    

Added python-wheel to CBL-Mariner 2.0


11.2    12/28/2024    

Added python-wheel to CBL-Mariner 2.0


11.3    12/29/2024    

Added python-wheel to CBL-Mariner 2.0


11.4    12/30/2024    

Added python-wheel to CBL-Mariner 2.0


11.5    12/31/2024    

Added python-wheel to CBL-Mariner 2.0


11.6    01/01/2025    

Added python-wheel to CBL-Mariner 2.0


11.7    01/02/2025    

Added python-wheel to CBL-Mariner 2.0


11.8    01/03/2025    

Added python-wheel to CBL-Mariner 2.0


11.9    01/04/2025    

Added python-wheel to CBL-Mariner 2.0


12.0    01/05/2025    

Added python-wheel to CBL-Mariner 2.0


12.1    01/06/2025    

Added python-wheel to CBL-Mariner 2.0


12.2    01/07/2025    

Added python-wheel to CBL-Mariner 2.0


12.3    01/08/2025    

Added python-wheel to CBL-Mariner 2.0


12.4    01/09/2025    

Added python-wheel to CBL-Mariner 2.0


12.5    01/10/2025    

Added python-wheel to CBL-Mariner 2.0


12.6    01/11/2025    

Added python-wheel to CBL-Mariner 2.0


12.7    01/12/2025    

Added python-wheel to CBL-Mariner 2.0


12.8    01/13/2025    

Added python-wheel to CBL-Mariner 2.0


12.9    01/15/2025    

Added python-wheel to CBL-Mariner 2.0


13.0    01/16/2025    

Added python-wheel to CBL-Mariner 2.0


13.1    01/17/2025    

Added python-wheel to CBL-Mariner 2.0


13.2    01/18/2025    

Added python-wheel to CBL-Mariner 2.0


13.3    01/19/2025    

Added python-wheel to CBL-Mariner 2.0


13.4    01/20/2025    

Added python-wheel to CBL-Mariner 2.0


13.5    01/21/2025    

Added python-wheel to CBL-Mariner 2.0


13.6    01/22/2025    

Added python-wheel to CBL-Mariner 2.0


13.7    01/23/2025    

Added python-wheel to CBL-Mariner 2.0


13.8    01/24/2025    

Added python-wheel to CBL-Mariner 2.0


13.9    01/25/2025    

Added python-wheel to CBL-Mariner 2.0


14.0    01/27/2025    

Added python-wheel to CBL-Mariner 2.0


14.1    01/28/2025    

Added python-wheel to CBL-Mariner 2.0


14.2    01/29/2025    

Added python-wheel to CBL-Mariner 2.0


14.3    01/30/2025    

Added python-wheel to CBL-Mariner 2.0


14.4    02/01/2025    

Added python-wheel to CBL-Mariner 2.0


14.5    02/02/2025    

Added python-wheel to CBL-Mariner 2.0


14.6    02/03/2025    

Added python-wheel to CBL-Mariner 2.0


14.7    02/04/2025    

Added python-wheel to CBL-Mariner 2.0


14.8    02/05/2025    

Added python-wheel to CBL-Mariner 2.0


14.9    02/07/2025    

Added python-wheel to CBL-Mariner 2.0


15.0    02/08/2025    

Added python-wheel to CBL-Mariner 2.0


15.1    02/09/2025    

Added python-wheel to CBL-Mariner 2.0


15.2    02/10/2025    

Added python-wheel to CBL-Mariner 2.0


15.3    02/11/2025    

Added python-wheel to CBL-Mariner 2.0


15.4    02/12/2025    

Added python-wheel to CBL-Mariner 2.0


15.5    02/13/2025    

Added python-wheel to CBL-Mariner 2.0


15.6    02/14/2025    

Added python-wheel to CBL-Mariner 2.0


15.7    02/15/2025    

Added python-wheel to CBL-Mariner 2.0


15.8    02/16/2025    

Added python-wheel to CBL-Mariner 2.0


15.9    02/17/2025    

Added python-wheel to CBL-Mariner 2.0


16.0    02/18/2025    

Added python-wheel to CBL-Mariner 2.0


16.1    02/19/2025    

Added python-wheel to CBL-Mariner 2.0


16.2    02/20/2025    

Added python-wheel to CBL-Mariner 2.0


16.3    02/21/2025    

Added python-wheel to CBL-Mariner 2.0


16.4    02/22/2025    

Added python-wheel to CBL-Mariner 2.0


16.5    02/23/2025    

Added python-wheel to CBL-Mariner 2.0


16.6    02/24/2025    

Added python-wheel to CBL-Mariner 2.0


16.7    02/25/2025    

Added python-wheel to CBL-Mariner 2.0


16.8    02/26/2025    

Added python-wheel to CBL-Mariner 2.0


16.9    02/27/2025    

Added python-wheel to CBL-Mariner 2.0


17.0    02/28/2025    

Added python-wheel to CBL-Mariner 2.0


17.1    03/01/2025    

Added python-wheel to CBL-Mariner 2.0


17.2    03/02/2025    

Added python-wheel to CBL-Mariner 2.0


17.3    03/03/2025    

Added python-wheel to CBL-Mariner 2.0


17.4    03/04/2025    

Added python-wheel to CBL-Mariner 2.0


17.5    03/05/2025    

Added python-wheel to CBL-Mariner 2.0


17.6    03/06/2025    

Added python-wheel to CBL-Mariner 2.0


17.7    03/08/2025    

Added python-wheel to CBL-Mariner 2.0


17.8    03/09/2025    

Added python-wheel to CBL-Mariner 2.0


17.9    03/10/2025    

Added python-wheel to CBL-Mariner 2.0


18.0    03/11/2025    

Added python-wheel to CBL-Mariner 2.0


18.1    03/12/2025    

Added python-wheel to CBL-Mariner 2.0


18.2    03/14/2025    

Added python-wheel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-40898
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM python-wheel (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.33.6-8
Unknown None
CBL Mariner 2.0 x64 python-wheel (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.33.6-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-40898 None

CVE-2019-14584 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-14584
MITRE
NVD

Issuing CNA: secure@intel.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/07/2024    

Information published.


1.1    12/08/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.2    12/09/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.3    12/10/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.4    12/11/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.5    12/12/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.6    12/13/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.7    12/14/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.8    12/15/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.9    12/16/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.0    12/17/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.1    12/18/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.2    12/19/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.3    12/20/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.4    12/21/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.5    12/22/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.6    12/23/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.7    12/24/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.8    12/25/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.9    12/26/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.0    12/27/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.1    12/28/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.2    12/29/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.3    12/30/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.4    12/31/2024    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.5    01/01/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.6    01/02/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.7    01/03/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.8    01/04/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.9    01/05/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.0    01/06/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.1    01/07/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.2    01/08/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.3    01/09/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.4    01/10/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.5    01/11/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.6    01/12/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.7    01/13/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.8    01/15/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.9    01/16/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.0    01/17/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.1    01/18/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.2    01/19/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.3    01/20/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.4    01/21/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.5    01/22/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.6    01/23/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.7    01/24/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.8    01/25/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.9    01/27/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.0    01/28/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.1    01/29/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.2    01/30/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.3    02/01/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.4    02/02/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.5    02/03/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.6    02/04/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.7    02/05/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.8    02/07/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.9    02/08/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.0    02/09/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.1    02/10/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.2    02/11/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.3    02/12/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.4    02/13/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.5    02/14/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.6    02/15/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.7    02/16/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.8    02/17/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.9    02/18/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.0    02/19/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.1    02/20/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.2    02/21/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.3    02/22/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.4    02/23/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.5    02/24/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.6    02/25/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.7    02/26/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.8    02/27/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.9    02/28/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.0    03/01/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.1    03/02/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.2    03/03/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.3    03/04/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.4    03/05/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.5    03/06/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.6    03/08/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.7    03/09/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.8    03/10/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.9    03/11/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


10.0    03/12/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


10.1    03/14/2025    

Added shim-unsigned-aarch64 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-14584
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim-unsigned-aarch64 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
15.8-5
Unknown None
Azure Linux 3.0 x64 shim-unsigned-aarch64 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
15.8-5
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-14584 None

CVE-2022-32746 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-32746
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/15/2024    

Information published.


1.1    10/16/2024    

Added samba to Azure Linux 3.0


1.2    10/17/2024    

Added samba to Azure Linux 3.0


1.3    10/18/2024    

Added samba to Azure Linux 3.0


1.4    10/19/2024    

Added samba to Azure Linux 3.0


1.5    10/20/2024    

Added samba to Azure Linux 3.0


1.6    10/21/2024    

Added samba to Azure Linux 3.0


1.7    10/22/2024    

Added samba to Azure Linux 3.0


1.8    10/23/2024    

Added samba to Azure Linux 3.0


1.9    10/24/2024    

Added samba to Azure Linux 3.0


2.0    10/25/2024    

Added samba to Azure Linux 3.0


2.1    10/26/2024    

Added samba to Azure Linux 3.0


2.2    10/27/2024    

Added samba to Azure Linux 3.0


2.3    10/28/2024    

Added samba to Azure Linux 3.0


2.4    10/29/2024    

Added samba to Azure Linux 3.0


2.5    10/30/2024    

Added samba to Azure Linux 3.0


2.6    10/31/2024    

Added samba to Azure Linux 3.0


2.7    11/01/2024    

Added samba to Azure Linux 3.0


2.8    11/02/2024    

Added samba to Azure Linux 3.0


2.9    11/04/2024    

Added samba to Azure Linux 3.0


3.0    11/05/2024    

Added samba to Azure Linux 3.0


3.1    11/06/2024    

Added samba to Azure Linux 3.0


3.2    11/07/2024    

Added samba to Azure Linux 3.0


3.3    11/08/2024    

Added samba to Azure Linux 3.0


3.4    11/09/2024    

Added samba to Azure Linux 3.0


3.5    11/10/2024    

Added samba to Azure Linux 3.0


3.6    11/11/2024    

Added samba to Azure Linux 3.0


3.7    11/12/2024    

Added samba to Azure Linux 3.0


3.8    11/13/2024    

Added samba to Azure Linux 3.0


3.9    11/14/2024    

Added samba to Azure Linux 3.0


4.0    11/15/2024    

Added samba to Azure Linux 3.0


4.1    11/16/2024    

Added samba to Azure Linux 3.0


4.2    11/17/2024    

Added samba to Azure Linux 3.0


4.3    11/18/2024    

Added samba to Azure Linux 3.0


4.4    11/19/2024    

Added samba to Azure Linux 3.0


4.5    11/20/2024    

Added samba to Azure Linux 3.0


4.6    11/21/2024    

Added samba to Azure Linux 3.0


4.7    11/23/2024    

Added samba to Azure Linux 3.0


4.8    11/24/2024    

Added samba to Azure Linux 3.0


4.9    11/25/2024    

Added samba to Azure Linux 3.0


5.0    11/26/2024    

Added samba to Azure Linux 3.0


5.1    11/27/2024    

Added samba to Azure Linux 3.0


5.2    11/28/2024    

Added samba to Azure Linux 3.0


5.3    11/29/2024    

Added samba to Azure Linux 3.0


5.4    11/30/2024    

Added samba to Azure Linux 3.0


5.5    12/01/2024    

Added samba to Azure Linux 3.0


5.6    12/02/2024    

Added samba to Azure Linux 3.0


5.7    12/03/2024    

Added samba to Azure Linux 3.0


5.8    12/04/2024    

Added samba to Azure Linux 3.0


5.9    12/05/2024    

Added samba to Azure Linux 3.0


6.0    12/07/2024    

Added samba to Azure Linux 3.0


6.1    12/08/2024    

Added samba to Azure Linux 3.0


6.2    12/09/2024    

Added samba to Azure Linux 3.0


6.3    12/10/2024    

Added samba to Azure Linux 3.0


6.4    12/11/2024    

Added samba to Azure Linux 3.0


6.5    12/12/2024    

Added samba to Azure Linux 3.0


6.6    12/13/2024    

Added samba to Azure Linux 3.0


6.7    12/14/2024    

Added samba to Azure Linux 3.0


6.8    12/15/2024    

Added samba to Azure Linux 3.0


6.9    12/16/2024    

Added samba to Azure Linux 3.0


7.0    12/17/2024    

Added samba to Azure Linux 3.0


7.1    12/18/2024    

Added samba to Azure Linux 3.0


7.2    12/19/2024    

Added samba to Azure Linux 3.0


7.3    12/20/2024    

Added samba to Azure Linux 3.0


7.4    12/21/2024    

Added samba to Azure Linux 3.0


7.5    12/22/2024    

Added samba to Azure Linux 3.0


7.6    12/23/2024    

Added samba to Azure Linux 3.0


7.7    12/24/2024    

Added samba to Azure Linux 3.0


7.8    12/25/2024    

Added samba to Azure Linux 3.0


7.9    12/26/2024    

Added samba to Azure Linux 3.0


8.0    12/27/2024    

Added samba to Azure Linux 3.0


8.1    12/28/2024    

Added samba to Azure Linux 3.0


8.2    12/29/2024    

Added samba to Azure Linux 3.0


8.3    12/30/2024    

Added samba to Azure Linux 3.0


8.4    12/31/2024    

Added samba to Azure Linux 3.0


8.5    01/01/2025    

Added samba to Azure Linux 3.0


8.6    01/02/2025    

Added samba to Azure Linux 3.0


8.7    01/03/2025    

Added samba to Azure Linux 3.0


8.8    01/04/2025    

Added samba to Azure Linux 3.0


8.9    01/05/2025    

Added samba to Azure Linux 3.0


9.0    01/06/2025    

Added samba to Azure Linux 3.0


9.1    01/07/2025    

Added samba to Azure Linux 3.0


9.2    01/08/2025    

Added samba to Azure Linux 3.0


9.3    01/09/2025    

Added samba to Azure Linux 3.0


9.4    01/10/2025    

Added samba to Azure Linux 3.0


9.5    01/11/2025    

Added samba to Azure Linux 3.0


9.6    01/12/2025    

Added samba to Azure Linux 3.0


9.7    01/13/2025    

Added samba to Azure Linux 3.0


9.8    01/15/2025    

Added samba to Azure Linux 3.0


9.9    01/16/2025    

Added samba to Azure Linux 3.0


10.0    01/17/2025    

Added samba to Azure Linux 3.0


10.1    01/18/2025    

Added samba to Azure Linux 3.0


10.2    01/19/2025    

Added samba to Azure Linux 3.0


10.3    01/20/2025    

Added samba to Azure Linux 3.0


10.4    01/21/2025    

Added samba to Azure Linux 3.0


10.5    01/22/2025    

Added samba to Azure Linux 3.0


10.6    01/23/2025    

Added samba to Azure Linux 3.0


10.7    01/24/2025    

Added samba to Azure Linux 3.0


10.8    01/25/2025    

Added samba to Azure Linux 3.0


10.9    01/27/2025    

Added samba to Azure Linux 3.0


11.0    01/28/2025    

Added samba to Azure Linux 3.0


11.1    01/29/2025    

Added samba to Azure Linux 3.0


11.2    01/30/2025    

Added samba to Azure Linux 3.0


11.3    02/01/2025    

Added samba to Azure Linux 3.0


11.4    02/02/2025    

Added samba to Azure Linux 3.0


11.5    02/03/2025    

Added samba to Azure Linux 3.0


11.6    02/04/2025    

Added samba to Azure Linux 3.0


11.7    02/05/2025    

Added samba to Azure Linux 3.0


11.8    02/07/2025    

Added samba to Azure Linux 3.0


11.9    02/08/2025    

Added samba to Azure Linux 3.0


12.0    02/09/2025    

Added samba to Azure Linux 3.0


12.1    02/10/2025    

Added samba to Azure Linux 3.0


12.2    02/11/2025    

Added samba to Azure Linux 3.0


12.3    02/12/2025    

Added samba to Azure Linux 3.0


12.4    02/13/2025    

Added samba to Azure Linux 3.0


12.5    02/14/2025    

Added samba to Azure Linux 3.0


12.6    02/15/2025    

Added samba to Azure Linux 3.0


12.7    02/16/2025    

Added samba to Azure Linux 3.0


12.8    02/17/2025    

Added samba to Azure Linux 3.0


12.9    02/18/2025    

Added samba to Azure Linux 3.0


13.0    02/19/2025    

Added samba to Azure Linux 3.0


13.1    02/20/2025    

Added samba to Azure Linux 3.0


13.2    02/21/2025    

Added samba to Azure Linux 3.0


13.3    02/22/2025    

Added samba to Azure Linux 3.0


13.4    02/23/2025    

Added samba to Azure Linux 3.0


13.5    02/24/2025    

Added samba to Azure Linux 3.0


13.6    02/25/2025    

Added samba to Azure Linux 3.0


13.7    02/26/2025    

Added samba to Azure Linux 3.0


13.8    02/27/2025    

Added samba to Azure Linux 3.0


13.9    02/28/2025    

Added samba to Azure Linux 3.0


14.0    03/01/2025    

Added samba to Azure Linux 3.0


14.1    03/02/2025    

Added samba to Azure Linux 3.0


14.2    03/03/2025    

Added samba to Azure Linux 3.0


14.3    03/04/2025    

Added samba to Azure Linux 3.0


14.4    03/05/2025    

Added samba to Azure Linux 3.0


14.5    03/06/2025    

Added samba to Azure Linux 3.0


14.6    03/08/2025    

Added samba to Azure Linux 3.0


14.7    03/09/2025    

Added samba to Azure Linux 3.0


14.8    03/10/2025    

Added samba to Azure Linux 3.0


14.9    03/11/2025    

Added samba to Azure Linux 3.0


15.0    03/12/2025    

Added samba to Azure Linux 3.0


15.1    03/14/2025    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-32746
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.18.3-1
Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.18.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-32746 None

CVE-2021-20277 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-20277
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/15/2024    

Information published.


1.1    10/16/2024    

Added samba to Azure Linux 3.0


1.2    10/17/2024    

Added samba to Azure Linux 3.0


1.3    10/18/2024    

Added samba to Azure Linux 3.0


1.4    10/19/2024    

Added samba to Azure Linux 3.0


1.5    10/20/2024    

Added samba to Azure Linux 3.0


1.6    10/21/2024    

Added samba to Azure Linux 3.0


1.7    10/22/2024    

Added samba to Azure Linux 3.0


1.8    10/23/2024    

Added samba to Azure Linux 3.0


1.9    10/24/2024    

Added samba to Azure Linux 3.0


2.0    10/25/2024    

Added samba to Azure Linux 3.0


2.1    10/26/2024    

Added samba to Azure Linux 3.0


2.2    10/27/2024    

Added samba to Azure Linux 3.0


2.3    10/28/2024    

Added samba to Azure Linux 3.0


2.4    10/29/2024    

Added samba to Azure Linux 3.0


2.5    10/30/2024    

Added samba to Azure Linux 3.0


2.6    10/31/2024    

Added samba to Azure Linux 3.0


2.7    11/01/2024    

Added samba to Azure Linux 3.0


2.8    11/02/2024    

Added samba to Azure Linux 3.0


2.9    11/04/2024    

Added samba to Azure Linux 3.0


3.0    11/05/2024    

Added samba to Azure Linux 3.0


3.1    11/06/2024    

Added samba to Azure Linux 3.0


3.2    11/07/2024    

Added samba to Azure Linux 3.0


3.3    11/08/2024    

Added samba to Azure Linux 3.0


3.4    11/09/2024    

Added samba to Azure Linux 3.0


3.5    11/10/2024    

Added samba to Azure Linux 3.0


3.6    11/11/2024    

Added samba to Azure Linux 3.0


3.7    11/12/2024    

Added samba to Azure Linux 3.0


3.8    11/13/2024    

Added samba to Azure Linux 3.0


3.9    11/14/2024    

Added samba to Azure Linux 3.0


4.0    11/15/2024    

Added samba to Azure Linux 3.0


4.1    11/16/2024    

Added samba to Azure Linux 3.0


4.2    11/17/2024    

Added samba to Azure Linux 3.0


4.3    11/18/2024    

Added samba to Azure Linux 3.0


4.4    11/19/2024    

Added samba to Azure Linux 3.0


4.5    11/20/2024    

Added samba to Azure Linux 3.0


4.6    11/21/2024    

Added samba to Azure Linux 3.0


4.7    11/23/2024    

Added samba to Azure Linux 3.0


4.8    11/24/2024    

Added samba to Azure Linux 3.0


4.9    11/25/2024    

Added samba to Azure Linux 3.0


5.0    11/26/2024    

Added samba to Azure Linux 3.0


5.1    11/27/2024    

Added samba to Azure Linux 3.0


5.2    11/28/2024    

Added samba to Azure Linux 3.0


5.3    11/29/2024    

Added samba to Azure Linux 3.0


5.4    11/30/2024    

Added samba to Azure Linux 3.0


5.5    12/01/2024    

Added samba to Azure Linux 3.0


5.6    12/02/2024    

Added samba to Azure Linux 3.0


5.7    12/03/2024    

Added samba to Azure Linux 3.0


5.8    12/04/2024    

Added samba to Azure Linux 3.0


5.9    12/05/2024    

Added samba to Azure Linux 3.0


6.0    12/07/2024    

Added samba to Azure Linux 3.0


6.1    12/08/2024    

Added samba to Azure Linux 3.0


6.2    12/09/2024    

Added samba to Azure Linux 3.0


6.3    12/10/2024    

Added samba to Azure Linux 3.0


6.4    12/11/2024    

Added samba to Azure Linux 3.0


6.5    12/12/2024    

Added samba to Azure Linux 3.0


6.6    12/13/2024    

Added samba to Azure Linux 3.0


6.7    12/14/2024    

Added samba to Azure Linux 3.0


6.8    12/15/2024    

Added samba to Azure Linux 3.0


6.9    12/16/2024    

Added samba to Azure Linux 3.0


7.0    12/17/2024    

Added samba to Azure Linux 3.0


7.1    12/18/2024    

Added samba to Azure Linux 3.0


7.2    12/19/2024    

Added samba to Azure Linux 3.0


7.3    12/20/2024    

Added samba to Azure Linux 3.0


7.4    12/21/2024    

Added samba to Azure Linux 3.0


7.5    12/22/2024    

Added samba to Azure Linux 3.0


7.6    12/23/2024    

Added samba to Azure Linux 3.0


7.7    12/24/2024    

Added samba to Azure Linux 3.0


7.8    12/25/2024    

Added samba to Azure Linux 3.0


7.9    12/26/2024    

Added samba to Azure Linux 3.0


8.0    12/27/2024    

Added samba to Azure Linux 3.0


8.1    12/28/2024    

Added samba to Azure Linux 3.0


8.2    12/29/2024    

Added samba to Azure Linux 3.0


8.3    12/30/2024    

Added samba to Azure Linux 3.0


8.4    12/31/2024    

Added samba to Azure Linux 3.0


8.5    01/01/2025    

Added samba to Azure Linux 3.0


8.6    01/02/2025    

Added samba to Azure Linux 3.0


8.7    01/03/2025    

Added samba to Azure Linux 3.0


8.8    01/04/2025    

Added samba to Azure Linux 3.0


8.9    01/05/2025    

Added samba to Azure Linux 3.0


9.0    01/06/2025    

Added samba to Azure Linux 3.0


9.1    01/07/2025    

Added samba to Azure Linux 3.0


9.2    01/08/2025    

Added samba to Azure Linux 3.0


9.3    01/09/2025    

Added samba to Azure Linux 3.0


9.4    01/10/2025    

Added samba to Azure Linux 3.0


9.5    01/11/2025    

Added samba to Azure Linux 3.0


9.6    01/12/2025    

Added samba to Azure Linux 3.0


9.7    01/13/2025    

Added samba to Azure Linux 3.0


9.8    01/15/2025    

Added samba to Azure Linux 3.0


9.9    01/16/2025    

Added samba to Azure Linux 3.0


10.0    01/17/2025    

Added samba to Azure Linux 3.0


10.1    01/18/2025    

Added samba to Azure Linux 3.0


10.2    01/19/2025    

Added samba to Azure Linux 3.0


10.3    01/20/2025    

Added samba to Azure Linux 3.0


10.4    01/21/2025    

Added samba to Azure Linux 3.0


10.5    01/22/2025    

Added samba to Azure Linux 3.0


10.6    01/23/2025    

Added samba to Azure Linux 3.0


10.7    01/24/2025    

Added samba to Azure Linux 3.0


10.8    01/25/2025    

Added samba to Azure Linux 3.0


10.9    01/27/2025    

Added samba to Azure Linux 3.0


11.0    01/28/2025    

Added samba to Azure Linux 3.0


11.1    01/29/2025    

Added samba to Azure Linux 3.0


11.2    01/30/2025    

Added samba to Azure Linux 3.0


11.3    02/01/2025    

Added samba to Azure Linux 3.0


11.4    02/02/2025    

Added samba to Azure Linux 3.0


11.5    02/03/2025    

Added samba to Azure Linux 3.0


11.6    02/04/2025    

Added samba to Azure Linux 3.0


11.7    02/05/2025    

Added samba to Azure Linux 3.0


11.8    02/07/2025    

Added samba to Azure Linux 3.0


11.9    02/08/2025    

Added samba to Azure Linux 3.0


12.0    02/09/2025    

Added samba to Azure Linux 3.0


12.1    02/10/2025    

Added samba to Azure Linux 3.0


12.2    02/11/2025    

Added samba to Azure Linux 3.0


12.3    02/12/2025    

Added samba to Azure Linux 3.0


12.4    02/13/2025    

Added samba to Azure Linux 3.0


12.5    02/14/2025    

Added samba to Azure Linux 3.0


12.6    02/15/2025    

Added samba to Azure Linux 3.0


12.7    02/16/2025    

Added samba to Azure Linux 3.0


12.8    02/17/2025    

Added samba to Azure Linux 3.0


12.9    02/18/2025    

Added samba to Azure Linux 3.0


13.0    02/19/2025    

Added samba to Azure Linux 3.0


13.1    02/20/2025    

Added samba to Azure Linux 3.0


13.2    02/21/2025    

Added samba to Azure Linux 3.0


13.3    02/22/2025    

Added samba to Azure Linux 3.0


13.4    02/23/2025    

Added samba to Azure Linux 3.0


13.5    02/24/2025    

Added samba to Azure Linux 3.0


13.6    02/25/2025    

Added samba to Azure Linux 3.0


13.7    02/26/2025    

Added samba to Azure Linux 3.0


13.8    02/27/2025    

Added samba to Azure Linux 3.0


13.9    02/28/2025    

Added samba to Azure Linux 3.0


14.0    03/01/2025    

Added samba to Azure Linux 3.0


14.1    03/02/2025    

Added samba to Azure Linux 3.0


14.2    03/03/2025    

Added samba to Azure Linux 3.0


14.3    03/04/2025    

Added samba to Azure Linux 3.0


14.4    03/05/2025    

Added samba to Azure Linux 3.0


14.5    03/06/2025    

Added samba to Azure Linux 3.0


14.6    03/08/2025    

Added samba to Azure Linux 3.0


14.7    03/09/2025    

Added samba to Azure Linux 3.0


14.8    03/10/2025    

Added samba to Azure Linux 3.0


14.9    03/11/2025    

Added samba to Azure Linux 3.0


15.0    03/12/2025    

Added samba to Azure Linux 3.0


15.1    03/14/2025    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-20277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-20277 None

CVE-2019-3816 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3816
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    04/02/2024    

Information published.


1.6    06/30/2024    

Information published.


1.1    07/02/2024    

Information published.


1.2    07/03/2024    

Information published.


1.3    07/04/2024    

Information published.


1.4    07/05/2024    

Information published.


1.5    07/06/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/16/2024    

Information published.


4.9    08/17/2024    

Information published.


5.0    08/18/2024    

Information published.


5.1    08/19/2024    

Information published.


5.2    08/20/2024    

Information published.


5.3    08/21/2024    

Information published.


5.4    08/22/2024    

Information published.


5.5    08/23/2024    

Information published.


5.6    08/24/2024    

Information published.


5.7    08/25/2024    

Information published.


5.8    08/26/2024    

Information published.


5.9    08/27/2024    

Information published.


6.0    08/28/2024    

Information published.


6.1    08/29/2024    

Information published.


6.2    08/30/2024    

Information published.


6.3    08/31/2024    

Information published.


6.4    09/01/2024    

Information published.


6.5    09/02/2024    

Information published.


6.6    09/03/2024    

Information published.


6.7    09/05/2024    

Information published.


6.8    09/06/2024    

Information published.


6.9    09/07/2024    

Information published.


7.0    09/08/2024    

Information published.


7.1    09/11/2024    

Information published.


7.2    09/12/2024    

Information published.


7.3    09/13/2024    

Information published.


7.4    09/14/2024    

Information published.


7.5    09/15/2024    

Information published.


7.6    09/16/2024    

Information published.


7.7    09/17/2024    

Information published.


7.8    09/18/2024    

Information published.


7.9    09/19/2024    

Information published.


8.0    09/20/2024    

Information published.


8.1    09/21/2024    

Information published.


8.2    09/22/2024    

Information published.


8.3    09/23/2024    

Information published.


8.4    09/24/2024    

Information published.


8.5    09/25/2024    

Information published.


8.6    09/26/2024    

Information published.


8.7    09/27/2024    

Information published.


8.8    09/28/2024    

Information published.


8.9    09/29/2024    

Information published.


9.0    09/30/2024    

Information published.


9.1    10/01/2024    

Information published.


9.2    10/02/2024    

Information published.


9.3    10/03/2024    

Information published.


9.4    10/04/2024    

Information published.


9.5    10/05/2024    

Information published.


9.6    10/06/2024    

Information published.


9.7    10/07/2024    

Information published.


9.8    10/08/2024    

Information published.


9.9    10/09/2024    

Information published.


10.0    10/10/2024    

Information published.


10.1    10/11/2024    

Information published.


10.2    10/12/2024    

Information published.


10.3    10/13/2024    

Information published.


10.4    10/14/2024    

Information published.


10.5    10/15/2024    

Added openwsman to CBL-Mariner 2.0


10.6    10/16/2024    

Added openwsman to CBL-Mariner 2.0


10.7    10/17/2024    

Added openwsman to CBL-Mariner 2.0


10.8    10/18/2024    

Added openwsman to CBL-Mariner 2.0


10.9    10/19/2024    

Added openwsman to CBL-Mariner 2.0


11.0    10/20/2024    

Added openwsman to CBL-Mariner 2.0


11.1    10/21/2024    

Added openwsman to CBL-Mariner 2.0


11.2    10/22/2024    

Added openwsman to CBL-Mariner 2.0


11.3    10/23/2024    

Added openwsman to CBL-Mariner 2.0


11.4    10/24/2024    

Added openwsman to CBL-Mariner 2.0


11.5    10/25/2024    

Added openwsman to CBL-Mariner 2.0


11.6    10/26/2024    

Added openwsman to CBL-Mariner 2.0


11.7    10/27/2024    

Added openwsman to CBL-Mariner 2.0


11.8    10/28/2024    

Added openwsman to CBL-Mariner 2.0


11.9    10/29/2024    

Added openwsman to CBL-Mariner 2.0


12.0    10/30/2024    

Added openwsman to CBL-Mariner 2.0


12.1    10/31/2024    

Added openwsman to CBL-Mariner 2.0


12.2    11/01/2024    

Added openwsman to CBL-Mariner 2.0


12.3    11/02/2024    

Added openwsman to CBL-Mariner 2.0


12.4    11/04/2024    

Added openwsman to CBL-Mariner 2.0


12.5    11/05/2024    

Added openwsman to CBL-Mariner 2.0


12.6    11/06/2024    

Added openwsman to CBL-Mariner 2.0


12.7    11/07/2024    

Added openwsman to CBL-Mariner 2.0


12.8    11/08/2024    

Added openwsman to CBL-Mariner 2.0


12.9    11/09/2024    

Added openwsman to CBL-Mariner 2.0


13.0    11/10/2024    

Added openwsman to CBL-Mariner 2.0


13.1    11/11/2024    

Added openwsman to CBL-Mariner 2.0


13.2    11/12/2024    

Added openwsman to CBL-Mariner 2.0


13.3    11/13/2024    

Added openwsman to CBL-Mariner 2.0


13.4    11/14/2024    

Added openwsman to CBL-Mariner 2.0


13.5    11/15/2024    

Added openwsman to CBL-Mariner 2.0


13.6    11/16/2024    

Added openwsman to CBL-Mariner 2.0


13.7    11/17/2024    

Added openwsman to CBL-Mariner 2.0


13.8    11/18/2024    

Added openwsman to CBL-Mariner 2.0


13.9    11/19/2024    

Added openwsman to CBL-Mariner 2.0


14.0    11/20/2024    

Added openwsman to CBL-Mariner 2.0


14.1    11/21/2024    

Added openwsman to CBL-Mariner 2.0


14.2    11/23/2024    

Added openwsman to CBL-Mariner 2.0


14.3    11/24/2024    

Added openwsman to CBL-Mariner 2.0


14.4    11/25/2024    

Added openwsman to CBL-Mariner 2.0


14.5    11/26/2024    

Added openwsman to CBL-Mariner 2.0


14.6    11/27/2024    

Added openwsman to CBL-Mariner 2.0


14.7    11/28/2024    

Added openwsman to CBL-Mariner 2.0


14.8    11/29/2024    

Added openwsman to CBL-Mariner 2.0


14.9    11/30/2024    

Added openwsman to CBL-Mariner 2.0


15.0    12/01/2024    

Added openwsman to CBL-Mariner 2.0


15.1    12/02/2024    

Added openwsman to CBL-Mariner 2.0


15.2    12/03/2024    

Added openwsman to CBL-Mariner 2.0


15.3    12/04/2024    

Added openwsman to CBL-Mariner 2.0


15.4    12/05/2024    

Added openwsman to CBL-Mariner 2.0


15.5    12/07/2024    

Added openwsman to CBL-Mariner 2.0


15.6    12/08/2024    

Added openwsman to CBL-Mariner 2.0


15.7    12/09/2024    

Added openwsman to CBL-Mariner 2.0


15.8    12/10/2024    

Added openwsman to CBL-Mariner 2.0


15.9    12/11/2024    

Added openwsman to CBL-Mariner 2.0


16.0    12/12/2024    

Added openwsman to CBL-Mariner 2.0


16.1    12/13/2024    

Added openwsman to CBL-Mariner 2.0


16.2    12/14/2024    

Added openwsman to CBL-Mariner 2.0


16.3    12/15/2024    

Added openwsman to CBL-Mariner 2.0


16.4    12/16/2024    

Added openwsman to CBL-Mariner 2.0


16.5    12/17/2024    

Added openwsman to CBL-Mariner 2.0


16.6    12/18/2024    

Added openwsman to CBL-Mariner 2.0


16.7    12/19/2024    

Added openwsman to CBL-Mariner 2.0


16.8    12/20/2024    

Added openwsman to CBL-Mariner 2.0


16.9    12/21/2024    

Added openwsman to CBL-Mariner 2.0


17.0    12/22/2024    

Added openwsman to CBL-Mariner 2.0


17.1    12/23/2024    

Added openwsman to CBL-Mariner 2.0


17.2    12/24/2024    

Added openwsman to CBL-Mariner 2.0


17.3    12/25/2024    

Added openwsman to CBL-Mariner 2.0


17.4    12/26/2024    

Added openwsman to CBL-Mariner 2.0


17.5    12/27/2024    

Added openwsman to CBL-Mariner 2.0


17.6    12/28/2024    

Added openwsman to CBL-Mariner 2.0


17.7    12/29/2024    

Added openwsman to CBL-Mariner 2.0


17.8    12/30/2024    

Added openwsman to CBL-Mariner 2.0


17.9    12/31/2024    

Added openwsman to CBL-Mariner 2.0


18.0    01/01/2025    

Added openwsman to CBL-Mariner 2.0


18.1    01/02/2025    

Added openwsman to CBL-Mariner 2.0


18.2    01/03/2025    

Added openwsman to CBL-Mariner 2.0


18.3    01/04/2025    

Added openwsman to CBL-Mariner 2.0


18.4    01/05/2025    

Added openwsman to CBL-Mariner 2.0


18.5    01/06/2025    

Added openwsman to CBL-Mariner 2.0


18.6    01/07/2025    

Added openwsman to CBL-Mariner 2.0


18.7    01/08/2025    

Added openwsman to CBL-Mariner 2.0


18.8    01/09/2025    

Added openwsman to CBL-Mariner 2.0


18.9    01/10/2025    

Added openwsman to CBL-Mariner 2.0


19.0    01/11/2025    

Added openwsman to CBL-Mariner 2.0


19.1    01/12/2025    

Added openwsman to CBL-Mariner 2.0


19.2    01/13/2025    

Added openwsman to CBL-Mariner 2.0


19.3    01/15/2025    

Added openwsman to CBL-Mariner 2.0


19.4    01/16/2025    

Added openwsman to CBL-Mariner 2.0


19.5    01/17/2025    

Added openwsman to CBL-Mariner 2.0


19.6    01/18/2025    

Added openwsman to CBL-Mariner 2.0


19.7    01/19/2025    

Added openwsman to CBL-Mariner 2.0


19.8    01/20/2025    

Added openwsman to CBL-Mariner 2.0


19.9    01/21/2025    

Added openwsman to CBL-Mariner 2.0


20.0    01/22/2025    

Added openwsman to CBL-Mariner 2.0


20.1    01/23/2025    

Added openwsman to CBL-Mariner 2.0


20.2    01/24/2025    

Added openwsman to CBL-Mariner 2.0


20.3    01/25/2025    

Added openwsman to CBL-Mariner 2.0


20.4    01/27/2025    

Added openwsman to CBL-Mariner 2.0


20.5    01/28/2025    

Added openwsman to CBL-Mariner 2.0


20.6    01/29/2025    

Added openwsman to CBL-Mariner 2.0


20.7    01/30/2025    

Added openwsman to CBL-Mariner 2.0


20.8    02/01/2025    

Added openwsman to CBL-Mariner 2.0


20.9    02/02/2025    

Added openwsman to CBL-Mariner 2.0


21.0    02/03/2025    

Added openwsman to CBL-Mariner 2.0


21.1    02/04/2025    

Added openwsman to CBL-Mariner 2.0


21.2    02/05/2025    

Added openwsman to CBL-Mariner 2.0


21.3    02/07/2025    

Added openwsman to CBL-Mariner 2.0


21.4    02/08/2025    

Added openwsman to CBL-Mariner 2.0


21.5    02/09/2025    

Added openwsman to CBL-Mariner 2.0


21.6    02/10/2025    

Added openwsman to CBL-Mariner 2.0


21.7    02/11/2025    

Added openwsman to CBL-Mariner 2.0


21.8    02/12/2025    

Added openwsman to CBL-Mariner 2.0


21.9    02/13/2025    

Added openwsman to CBL-Mariner 2.0


22.0    02/14/2025    

Added openwsman to CBL-Mariner 2.0


22.1    02/15/2025    

Added openwsman to CBL-Mariner 2.0


22.2    02/16/2025    

Added openwsman to CBL-Mariner 2.0


22.3    02/17/2025    

Added openwsman to CBL-Mariner 2.0


22.4    02/18/2025    

Added openwsman to CBL-Mariner 2.0


22.5    02/19/2025    

Added openwsman to CBL-Mariner 2.0


22.6    02/20/2025    

Added openwsman to CBL-Mariner 2.0


22.7    02/21/2025    

Added openwsman to CBL-Mariner 2.0


22.8    02/22/2025    

Added openwsman to CBL-Mariner 2.0


22.9    02/23/2025    

Added openwsman to CBL-Mariner 2.0


23.0    02/24/2025    

Added openwsman to CBL-Mariner 2.0


23.1    02/25/2025    

Added openwsman to CBL-Mariner 2.0


23.2    02/26/2025    

Added openwsman to CBL-Mariner 2.0


23.3    02/27/2025    

Added openwsman to CBL-Mariner 2.0


23.4    02/28/2025    

Added openwsman to CBL-Mariner 2.0


23.5    03/01/2025    

Added openwsman to CBL-Mariner 2.0


23.6    03/02/2025    

Added openwsman to CBL-Mariner 2.0


23.7    03/03/2025    

Added openwsman to CBL-Mariner 2.0


23.8    03/04/2025    

Added openwsman to CBL-Mariner 2.0


23.9    03/05/2025    

Added openwsman to CBL-Mariner 2.0


24.0    03/06/2025    

Added openwsman to CBL-Mariner 2.0


24.1    03/08/2025    

Added openwsman to CBL-Mariner 2.0


24.2    03/09/2025    

Added openwsman to CBL-Mariner 2.0


24.3    03/10/2025    

Added openwsman to CBL-Mariner 2.0


24.4    03/11/2025    

Added openwsman to CBL-Mariner 2.0


24.5    03/12/2025    

Added openwsman to CBL-Mariner 2.0


24.6    03/14/2025    

Added openwsman to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3816
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13
Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3816 None

CVE-2025-26466 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26466
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/02/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26466
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM openssh (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
9.8p1-3
Unknown None
Azure Linux 3.0 x64 openssh (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
9.8p1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26466 None

CVE-2024-50608 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50608
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/04/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50608
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.9-3
Unknown None
Azure Linux 3.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.9-3
Unknown None
CBL Mariner 2.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None
CBL Mariner 2.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50608 None

CVE-2025-26618 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26618
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/04/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26618
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
26.2.5.9-1
Unknown None
Azure Linux 3.0 x64 erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
26.2.5.9-1
Unknown None
CBL Mariner 2.0 ARM erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
25.2-3
Unknown None
CBL Mariner 2.0 x64 erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
25.2-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26618 None

CVE-2024-1454 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1454
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.4/TemporalScore:3.4
Base score metrics
Attack VectorPhysical
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06/30/2024    

Information published.


1.1    03/04/2025    

Added opensc to CBL-Mariner 2.0 Added opensc to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1454
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.25.1-3
Unknown None
Azure Linux 3.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.25.1-3
Unknown None
CBL Mariner 2.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.23.0-4
Unknown None
CBL Mariner 2.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.23.0-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1454 None

CVE-2024-9681 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9681
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    01/30/2025    

Information published.


0.3    02/01/2025    

Information published.


0.4    02/13/2025    

Information published.


0.5    02/23/2025    

Information published.


0.6    03/04/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9681
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.30.3-4

8.8.0-4
8.0.40-5
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.30.3-4

8.8.0-4
8.0.40-5
None
CBL Mariner 2.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.21.4-16

8.8.0-5
8.0.40-3
1.72.0-10
None
CBL Mariner 2.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.21.4-16

8.8.0-5
8.0.40-3
1.72.0-10
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9681 None

CVE-2025-27144 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27144
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/04/2025    

Information published.


0.2    03/05/2025    

Information published.


0.3    03/06/2025    

Information published.


0.4    03/08/2025    

Information published.


0.5    03/12/2025    

Information published.


0.6    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27144
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
gh (CBL-Mariner)
influxdb (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.12.15-2

1.57.0-13
2.62.0-7
2.7.5-2
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
gh (CBL-Mariner)
influxdb (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.12.15-2

1.57.0-13
2.62.0-7
2.7.5-2
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
dcos-cli (CBL-Mariner)
influxdb (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.11.2-19

1.55.0-23
1.2.0-20
2.6.1-21
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
dcos-cli (CBL-Mariner)
influxdb (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.11.2-19

1.55.0-23
1.2.0-20
2.6.1-21
None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27144 None

CVE-2024-50609 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50609
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/04/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50609
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.9-3
Unknown None
Azure Linux 3.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.9-3
Unknown None
CBL Mariner 2.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None
CBL Mariner 2.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50609 None

CVE-2023-52917 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-52917
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11/09/2024    

Information published.


1.1    12/12/2024    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


1.2    03/04/2025    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-52917
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.56.1-5
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.56.1-5
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-52917 None

CVE-2021-36373 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-36373
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/17/2021    

Information published.


1.1    06/30/2024    

Information published.


1.2    03/04/2025    

Added javapackages-bootstrap to CBL-Mariner 2.0 Added javapackages-bootstrap to Azure Linux 3.0 Added ant to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-36373
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
Azure Linux 3.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
CBL Mariner 1.0 ARM ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 1.0 x64 ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 2.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None
CBL Mariner 2.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-36373 None

CVE-2021-36374 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-36374
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/17/2021    

Information published.


1.1    06/30/2024    

Information published.


1.2    03/04/2025    

Added javapackages-bootstrap to CBL-Mariner 2.0 Added javapackages-bootstrap to Azure Linux 3.0 Added ant to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-36374
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
Azure Linux 3.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
CBL Mariner 1.0 ARM ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 1.0 x64 ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 2.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None
CBL Mariner 2.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-36374 None

CVE-2023-40660 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40660
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:6.6
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06/30/2024    

Information published.


1.1    03/04/2025    

Added opensc to CBL-Mariner 2.0 Added opensc to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40660
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.25.1-3
Unknown None
Azure Linux 3.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.25.1-3
Unknown None
CBL Mariner 2.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.23.0-4
Unknown None
CBL Mariner 2.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.23.0-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40660 None

CVE-2024-50181 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50181
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/12/2024    

Information published.


1.1    03/04/2025    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50181 None

CVE-2024-56741 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56741
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/04/2025    

Information published.


0.3    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56741
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56741 None

CVE-2024-39908 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39908
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/15/2024    

Information published.


1.1    12/19/2024    

Added ruby to Azure Linux 3.0 Added rubygem-rexml to Azure Linux 3.0


1.2    03/04/2025    

Added rubygem-rexml to CBL-Mariner 2.0 Added ruby to Azure Linux 3.0 Added rubygem-rexml to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39908
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ruby (CBL-Mariner)
rubygem-rexml (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.3.5-1

3.3.4-1
None
Azure Linux 3.0 x64 ruby (CBL-Mariner)
rubygem-rexml (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.3.5-1

3.3.4-1
None
CBL Mariner 2.0 ARM rubygem-rexml (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.2.7-4
Unknown None
CBL Mariner 2.0 x64 rubygem-rexml (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.2.7-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39908 None

CVE-2025-0840 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0840
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/16/2025    

Information published.


0.2    03/05/2025    

Information published.


0.3    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0840
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.41-4
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.41-4
Unknown None
CBL Mariner 2.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.37-11
Unknown None
CBL Mariner 2.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.37-11
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0840 None

CVE-2024-26973 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26973
MITRE
NVD

Issuing CNA: cve@kernel.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05/13/2024    

Information published.


1.1    08/29/2024    

Information published.


1.2    08/30/2024    

Information published.


1.3    08/31/2024    

Information published.


1.4    09/01/2024    

Information published.


1.5    09/02/2024    

Information published.


1.6    09/03/2024    

Information published.


1.7    09/05/2024    

Information published.


1.8    09/06/2024    

Information published.


1.9    09/07/2024    

Information published.


2.0    09/08/2024    

Information published.


2.1    09/11/2024    

Information published.


2.2    03/05/2025    

Added hyperv-daemons to CBL-Mariner 2.0 Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26973
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.158.1-1
Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.158.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26973 None

CVE-2024-53150 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53150
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53150
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53150 None

CVE-2024-53151 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53151
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53151
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53151 None

CVE-2024-53215 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53215
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53215 None

CVE-2024-53180 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53180
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53180 None

CVE-2024-56568 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56568
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56568
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56568 None

CVE-2024-56567 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56567
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56567
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56567 None

CVE-2024-56598 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56598
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56598
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56598 None

CVE-2024-56634 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56634
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56634
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56634 None

CVE-2024-56640 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56640
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56640
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56640 None

CVE-2024-56720 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56720
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56720
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56720 None

CVE-2024-56754 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56754
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56754
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56754 None

CVE-2024-57802 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57802
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57802
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57802 None

CVE-2024-57807 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57807
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57807
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57807 None

CVE-2024-57900 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57900
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57900
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57900 None

CVE-2024-57938 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57938
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57938
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57938 None

CVE-2024-45828 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45828
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45828
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45828 None

CVE-2024-47143 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-47143
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-47143
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-47143 None

CVE-2024-53161 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53161
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53161 None

CVE-2024-53155 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53155
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53155 None

CVE-2024-55916 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-55916
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-55916
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-55916 None

CVE-2024-56548 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56548
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56548
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-3
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56548 None

CVE-2024-56600 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56600
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56600
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56600 None

CVE-2024-56626 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56626
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56626
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56626 None

CVE-2024-56627 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56627
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56627
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56627 None

CVE-2024-56662 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56662
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56662
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56662 None

CVE-2024-56659 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56659
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56659
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56659 None

CVE-2024-56724 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56724
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56724
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56724 None

CVE-2024-56728 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56728
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56728
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56728 None

CVE-2024-56774 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56774
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56774
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56774 None

CVE-2024-56777 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56777
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56777
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56777 None

CVE-2024-57901 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57901
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57901
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-3
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57901 None

CVE-2025-26596 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26596
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26596
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26596 None

CVE-2025-26594 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26594
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26594
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26594 None

CVE-2025-26595 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26595
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26595
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26595 None

CVE-2025-26598 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26598
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26598
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26598 None

CVE-2025-22134 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-22134
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.2/TemporalScore:4.2
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/18/2025    

Information published.


0.2    01/22/2025    

Information published.


0.3    02/05/2025    

Information published.


0.4    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-22134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-2
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-2
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-2
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-22134 None

CVE-2022-41862 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-41862
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.7/TemporalScore:3.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/12/2024    

Information published.


1.1    12/18/2024    

Added postgresql to CBL-Mariner 2.0


1.2    03/12/2025    

Added postgresql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-41862
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM postgresql (CBL-Mariner) Unknown Unknown Base: 3.7
Temporal: 3.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
14.11-1
Unknown None
CBL Mariner 2.0 x64 postgresql (CBL-Mariner) Unknown Unknown Base: 3.7
Temporal: 3.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
14.11-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-41862 None

CVE-2024-53859 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53859
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/30/2025    

Information published.


0.2    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53859
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gh (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
2.62.0-1
Unknown None
Azure Linux 3.0 x64 gh (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
2.62.0-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53859 None

CVE-2024-36620 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36620
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    12/13/2024    

Information published.


0.2    12/24/2024    

Information published.


0.3    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36620
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM moby-engine (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
25.0.3-8
Unknown None
Azure Linux 3.0 x64 moby-engine (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
25.0.3-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36620 None

CVE-2024-10963 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-10963
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    12/19/2024    

Information published.


0.2    12/24/2024    

Information published.


0.3    12/25/2024    

Information published.


0.4    12/26/2024    

Information published.


0.5    12/27/2024    

Information published.


0.6    12/28/2024    

Information published.


0.7    12/29/2024    

Information published.


0.8    12/30/2024    

Information published.


0.9    12/31/2024    

Information published.


1.0    01/01/2025    

Information published.


1.1    01/02/2025    

Added pam to Azure Linux 3.0


1.2    01/03/2025    

Added pam to Azure Linux 3.0


1.3    01/04/2025    

Added pam to Azure Linux 3.0


1.4    01/05/2025    

Added pam to Azure Linux 3.0


1.5    01/06/2025    

Added pam to Azure Linux 3.0


1.6    01/07/2025    

Added pam to Azure Linux 3.0


1.7    01/08/2025    

Added pam to Azure Linux 3.0


1.8    01/09/2025    

Added pam to Azure Linux 3.0


1.9    01/10/2025    

Added pam to Azure Linux 3.0


2.0    03/12/2025    

Added pam to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-10963
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM pam (CBL-Mariner) Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1.5.3-3
Unknown None
Azure Linux 3.0 x64 pam (CBL-Mariner) Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1.5.3-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-10963 None

CVE-2023-40551 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40551
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.1/TemporalScore:5.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    12/07/2024    

Added shim to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.2    03/12/2025    

Added shim to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40551
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner) Unknown Unknown Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-5
Unknown None
Azure Linux 3.0 x64 shim (CBL-Mariner) Unknown Unknown Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-5
Unknown None
CBL Mariner 2.0 ARM shim (CBL-Mariner) Unknown Unknown Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-1
Unknown None
CBL Mariner 2.0 x64 shim (CBL-Mariner) Unknown Unknown Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40551 None

CVE-2024-56657 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56657
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56657
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56657 None

CVE-2024-56763 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56763
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56763
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56763 None

CVE-2024-57892 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57892
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57892
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57892 None

CVE-2024-57980 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57980
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57980
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57980 None

CVE-2025-21637 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21637
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21637
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21637 None

CVE-2025-21718 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21718
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21718
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21718 None

CVE-2024-3651 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3651
MITRE
NVD

Issuing CNA: security@huntr.dev

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/26/2024    

Information published.


1.1    08/16/2024    

Information published.


1.2    08/17/2024    

Information published.


1.3    08/18/2024    

Information published.


1.4    08/19/2024    

Information published.


1.5    08/20/2024    

Information published.


1.6    08/21/2024    

Information published.


1.7    08/22/2024    

Information published.


1.8    08/23/2024    

Information published.


1.9    08/24/2024    

Information published.


2.0    08/25/2024    

Information published.


2.1    08/26/2024    

Information published.


2.2    08/27/2024    

Information published.


2.3    08/28/2024    

Information published.


2.4    08/29/2024    

Information published.


2.5    08/30/2024    

Information published.


2.6    08/31/2024    

Information published.


2.7    09/01/2024    

Information published.


2.8    09/02/2024    

Information published.


2.9    09/03/2024    

Information published.


3.0    09/05/2024    

Information published.


3.1    09/06/2024    

Information published.


3.2    09/07/2024    

Information published.


3.3    09/08/2024    

Information published.


3.4    09/11/2024    

Information published.


3.5    10/15/2024    

Added python-pip to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added python-idna to Azure Linux 3.0 Added python-idna to CBL-Mariner 2.0


3.6    03/14/2025    

Added python3 to Azure Linux 3.0 Added python-pip to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added python-idna to Azure Linux 3.0 Added python-idna to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3651
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-idna (CBL-Mariner)
python-pip (CBL-Mariner)
python3 (CBL-Mariner)
tensorflow (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.7-1

24.0-2
3.12.9-1
2.16.1-7
None
Azure Linux 3.0 x64 python-idna (CBL-Mariner)
python-pip (CBL-Mariner)
python3 (CBL-Mariner)
tensorflow (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.7-1

24.0-2
3.12.9-1
2.16.1-7
None
CBL Mariner 2.0 ARM python-idna (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.7-1
Unknown None
CBL Mariner 2.0 x64 python-idna (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3651 None

CVE-2015-2158 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2015-2158
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2015-2158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.3.8-1

2.5.12-4
None
Azure Linux 3.0 x64 fltk (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.3.8-1

2.5.12-4
None

Acknowledgements

CVE ID Acknowledgements
CVE-2015-2158 None

CVE-2020-14152 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2020-14152
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2020-14152
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2020-14152 None

CVE-2024-56658 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56658
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56658
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56658 None

CVE-2024-56710 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56710
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56710
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56710 None

CVE-2024-57912 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57912
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57912
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57912 None

CVE-2024-57978 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57978
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57978
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57978 None

CVE-2025-21638 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21638
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21638
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21638 None

CVE-2025-21680 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21680
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21680
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21680 None

CVE-2025-21716 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21716
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21716
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21716 None

CVE-2024-52006 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-52006
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/22/2025    

Information published.


0.2    01/23/2025    

Information published.


0.3    01/24/2025    

Information published.


0.4    01/25/2025    

Information published.


0.5    01/27/2025    

Information published.


0.6    01/28/2025    

Information published.


0.7    01/29/2025    

Information published.


0.8    01/30/2025    

Information published.


0.9    02/01/2025    

Information published.


1.0    02/02/2025    

Information published.


1.1    02/03/2025    

Added git to CBL-Mariner 2.0


1.2    02/04/2025    

Added git to CBL-Mariner 2.0


1.3    02/05/2025    

Added git to CBL-Mariner 2.0


1.4    02/07/2025    

Added git to CBL-Mariner 2.0


1.5    02/08/2025    

Added git to CBL-Mariner 2.0


1.6    02/09/2025    

Added git to CBL-Mariner 2.0


1.7    02/10/2025    

Added git to CBL-Mariner 2.0


1.8    02/11/2025    

Added git to CBL-Mariner 2.0


1.9    02/12/2025    

Added git to CBL-Mariner 2.0


2.0    02/13/2025    

Added git to CBL-Mariner 2.0


2.1    02/14/2025    

Added git to CBL-Mariner 2.0


2.2    02/15/2025    

Added git to CBL-Mariner 2.0


2.3    02/16/2025    

Added git to CBL-Mariner 2.0


2.4    02/17/2025    

Added git to CBL-Mariner 2.0


2.5    02/18/2025    

Added git to CBL-Mariner 2.0


2.6    02/19/2025    

Added git to CBL-Mariner 2.0


2.7    02/20/2025    

Added git to CBL-Mariner 2.0


2.8    02/21/2025    

Added git to CBL-Mariner 2.0


2.9    02/22/2025    

Added git to CBL-Mariner 2.0


3.0    02/23/2025    

Added git to CBL-Mariner 2.0


3.1    02/24/2025    

Added git to CBL-Mariner 2.0


3.2    02/25/2025    

Added git to CBL-Mariner 2.0


3.3    02/26/2025    

Added git to CBL-Mariner 2.0


3.4    02/27/2025    

Added git to CBL-Mariner 2.0


3.5    02/28/2025    

Added git to CBL-Mariner 2.0


3.6    03/01/2025    

Added git to CBL-Mariner 2.0


3.7    03/02/2025    

Added git to CBL-Mariner 2.0


3.8    03/03/2025    

Added git to CBL-Mariner 2.0


3.9    03/04/2025    

Added git to CBL-Mariner 2.0


4.0    03/05/2025    

Added git to CBL-Mariner 2.0


4.1    03/06/2025    

Added git to CBL-Mariner 2.0


4.2    03/08/2025    

Added git to CBL-Mariner 2.0


4.3    03/09/2025    

Added git to CBL-Mariner 2.0


4.4    03/10/2025    

Added git to CBL-Mariner 2.0


4.5    03/11/2025    

Added git to CBL-Mariner 2.0


4.6    03/12/2025    

Added git to CBL-Mariner 2.0


4.7    03/13/2025    

Added git to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-52006
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None
CBL Mariner 2.0 ARM git (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.40.4-1
Unknown None
CBL Mariner 2.0 x64 git (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.40.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-52006 None

CVE-2024-50349 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50349
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/22/2025    

Information published.


0.2    01/23/2025    

Information published.


0.3    01/24/2025    

Information published.


0.4    01/25/2025    

Information published.


0.5    01/27/2025    

Information published.


0.6    01/28/2025    

Information published.


0.7    01/29/2025    

Information published.


0.8    01/30/2025    

Information published.


0.9    02/01/2025    

Information published.


1.0    02/02/2025    

Information published.


1.1    02/03/2025    

Added git to CBL-Mariner 2.0


1.2    02/04/2025    

Added git to CBL-Mariner 2.0


1.3    02/05/2025    

Added git to CBL-Mariner 2.0


1.4    02/07/2025    

Added git to CBL-Mariner 2.0


1.5    02/08/2025    

Added git to CBL-Mariner 2.0


1.6    02/09/2025    

Added git to CBL-Mariner 2.0


1.7    02/10/2025    

Added git to CBL-Mariner 2.0


1.8    02/11/2025    

Added git to CBL-Mariner 2.0


1.9    02/12/2025    

Added git to CBL-Mariner 2.0


2.0    02/13/2025    

Added git to CBL-Mariner 2.0


2.1    02/14/2025    

Added git to CBL-Mariner 2.0


2.2    02/15/2025    

Added git to CBL-Mariner 2.0


2.3    02/16/2025    

Added git to CBL-Mariner 2.0


2.4    02/17/2025    

Added git to CBL-Mariner 2.0


2.5    02/18/2025    

Added git to CBL-Mariner 2.0


2.6    02/19/2025    

Added git to CBL-Mariner 2.0


2.7    02/20/2025    

Added git to CBL-Mariner 2.0


2.8    02/21/2025    

Added git to CBL-Mariner 2.0


2.9    02/22/2025    

Added git to CBL-Mariner 2.0


3.0    02/23/2025    

Added git to CBL-Mariner 2.0


3.1    02/24/2025    

Added git to CBL-Mariner 2.0


3.2    02/25/2025    

Added git to CBL-Mariner 2.0


3.3    02/26/2025    

Added git to CBL-Mariner 2.0


3.4    02/27/2025    

Added git to CBL-Mariner 2.0


3.5    02/28/2025    

Added git to CBL-Mariner 2.0


3.6    03/01/2025    

Added git to CBL-Mariner 2.0


3.7    03/02/2025    

Added git to CBL-Mariner 2.0


3.8    03/03/2025    

Added git to CBL-Mariner 2.0


3.9    03/04/2025    

Added git to CBL-Mariner 2.0


4.0    03/05/2025    

Added git to CBL-Mariner 2.0


4.1    03/06/2025    

Added git to CBL-Mariner 2.0


4.2    03/08/2025    

Added git to CBL-Mariner 2.0


4.3    03/09/2025    

Added git to CBL-Mariner 2.0


4.4    03/10/2025    

Added git to CBL-Mariner 2.0


4.5    03/11/2025    

Added git to CBL-Mariner 2.0


4.6    03/12/2025    

Added git to CBL-Mariner 2.0


4.7    03/13/2025    

Added git to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50349
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None
CBL Mariner 2.0 ARM git (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.40.4-1
Unknown None
CBL Mariner 2.0 x64 git (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.40.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50349 None

CVE-2022-28737 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-28737
MITRE
NVD

Issuing CNA: security@ubuntu.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    12/07/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.2    12/08/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.3    12/09/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.4    12/10/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.5    12/11/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.6    12/12/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.7    12/13/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.8    12/14/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


1.9    12/15/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.0    12/16/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.1    12/17/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.2    12/18/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.3    12/19/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.4    12/20/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.5    12/21/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.6    12/22/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.7    12/23/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.8    12/24/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


2.9    12/25/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.0    12/26/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.1    12/27/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.2    12/28/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.3    12/29/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.4    12/30/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.5    12/31/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.6    01/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.7    01/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.8    01/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.9    01/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.0    01/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.1    01/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.2    01/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.3    01/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.4    01/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.5    01/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.6    01/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.7    01/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.8    01/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.9    01/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.0    01/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.1    01/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.2    01/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.3    01/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.4    01/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.5    01/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.6    01/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.7    01/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.8    01/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.9    01/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.0    01/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.1    01/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.2    01/29/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.3    01/30/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.4    02/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.5    02/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.6    02/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.7    02/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.8    02/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


6.9    02/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.0    02/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.1    02/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.2    02/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.3    02/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.4    02/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.5    02/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.6    02/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.7    02/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.8    02/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


7.9    02/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.0    02/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.1    02/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.2    02/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.3    02/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.4    02/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.5    02/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.6    02/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.7    02/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.8    02/26/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


8.9    02/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.0    02/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.1    03/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.2    03/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.3    03/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.4    03/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.5    03/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.6    03/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.7    03/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.8    03/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


9.9    03/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


10.0    03/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


10.1    03/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


10.2    03/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-28737
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-5
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-5
None
CBL Mariner 2.0 ARM shim (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-1
Unknown None
CBL Mariner 2.0 x64 shim (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-28737 None

CVE-2024-3727 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3727
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.3/TemporalScore:8.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.1    06/30/2024    

Information published.


1.2    07/10/2024    

Information published.


1.3    08/16/2024    

Information published.


1.4    08/29/2024    

Information published.


1.5    08/30/2024    

Information published.


1.6    08/31/2024    

Information published.


1.7    09/01/2024    

Information published.


1.8    09/02/2024    

Information published.


1.9    09/03/2024    

Information published.


2.0    09/05/2024    

Information published.


2.1    09/06/2024    

Information published.


2.2    09/07/2024    

Information published.


2.3    09/08/2024    

Information published.


2.4    09/11/2024    

Information published.


2.5    09/19/2024    

Information published.


2.6    12/03/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


2.7    12/04/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


2.8    12/05/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


2.9    12/07/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.0    12/08/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.1    12/09/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.2    12/10/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.3    12/11/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.4    12/12/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.5    12/13/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.6    12/14/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.7    12/15/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.8    12/16/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.9    12/17/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.0    12/18/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.1    12/19/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.2    12/20/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.3    12/21/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.4    12/22/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.5    12/23/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.6    12/24/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.7    12/25/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.8    12/26/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.9    12/27/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.0    12/28/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.1    12/29/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.2    12/30/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.3    12/31/2024    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.4    01/01/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.5    01/02/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.6    01/03/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.7    01/04/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.8    01/05/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.9    01/06/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.0    01/07/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.1    01/08/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.2    01/09/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.3    01/10/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.4    01/11/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.5    01/12/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.6    01/13/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.7    01/15/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.8    01/16/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.9    01/17/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.0    01/18/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.1    01/19/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.2    01/20/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.3    01/21/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.4    01/22/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.5    01/23/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.6    01/24/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.7    01/25/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.8    01/27/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.9    01/28/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.0    01/29/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.1    01/30/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.2    02/01/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.3    02/02/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.4    02/03/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.5    02/04/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.6    02/05/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.7    02/07/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.8    02/08/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.9    02/09/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.0    02/10/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.1    02/11/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.2    02/12/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.3    02/13/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.4    02/14/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.5    02/15/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.6    02/16/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.7    02/17/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.8    02/18/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


9.9    02/19/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.0    02/20/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.1    02/21/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.2    02/22/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.3    02/23/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.4    02/24/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.5    02/25/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.6    02/26/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.7    02/27/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.8    02/28/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


10.9    03/01/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.0    03/02/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.1    03/03/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.2    03/04/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.3    03/05/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.4    03/06/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.5    03/08/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.6    03/09/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.7    03/10/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.8    03/11/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


11.9    03/12/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


12.0    03/13/2025    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcontainers-common (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
ig (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
20240213-2

1.57.0-2
0.29.0-1
1.14.4-1
None
Azure Linux 3.0 x64 containerized-data-importer (CBL-Mariner)
ig (CBL-Mariner)
libcontainers-common (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.57.0-2

0.29.0-1
20240213-2
1.14.4-1
None
CBL Mariner 2.0 ARM libcontainers-common (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
20210626-7

1.55.0-19
1.22.3-4
1.14.2-4
None
CBL Mariner 2.0 x64 containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
libcontainers-common (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.55.0-19

1.22.3-4
20210626-7
1.14.2-4
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3727 None

CVE-2022-32149 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-32149
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11/08/2023    

Information published.


1.1    01/24/2024    

Added sriov-network-device-plugin to CBL-Mariner 2.0


1.2    06/30/2024    

Information published.


1.3    08/29/2024    

Information published.


1.4    08/30/2024    

Information published.


1.5    08/31/2024    

Information published.


1.6    09/01/2024    

Information published.


1.7    09/02/2024    

Information published.


1.8    09/03/2024    

Information published.


1.9    09/05/2024    

Information published.


2.0    09/06/2024    

Information published.


2.1    09/07/2024    

Information published.


2.2    09/08/2024    

Information published.


2.3    09/11/2024    

Information published.


2.4    09/13/2024    

Information published.


2.5    09/19/2024    

Information published.


2.6    09/20/2024    

Information published.


2.7    09/21/2024    

Information published.


2.8    09/22/2024    

Information published.


2.9    09/23/2024    

Information published.


3.0    09/24/2024    

Information published.


3.1    09/25/2024    

Information published.


3.2    09/26/2024    

Information published.


3.3    09/27/2024    

Information published.


3.4    09/28/2024    

Information published.


3.5    09/29/2024    

Information published.


3.6    09/30/2024    

Information published.


3.7    10/01/2024    

Information published.


3.8    10/02/2024    

Information published.


3.9    10/03/2024    

Information published.


4.0    10/04/2024    

Information published.


4.1    10/05/2024    

Information published.


4.2    10/06/2024    

Information published.


4.3    10/07/2024    

Information published.


4.4    10/08/2024    

Information published.


4.5    10/09/2024    

Information published.


4.6    10/11/2024    

Information published.


4.7    10/12/2024    

Information published.


4.8    10/13/2024    

Information published.


4.9    10/14/2024    

Information published.


5.0    10/15/2024    

Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.1    10/16/2024    

Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.2    10/17/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.3    10/18/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.4    10/19/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.5    10/20/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.6    10/21/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.7    10/22/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.8    10/23/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.9    10/24/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.0    10/25/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.1    10/26/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.2    10/27/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.3    10/28/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.4    10/29/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.5    10/30/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.6    10/31/2024    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.7    11/01/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.8    11/02/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.9    11/04/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.0    11/05/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.1    11/06/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.2    11/07/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.3    11/08/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.4    11/09/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.5    11/10/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.6    11/11/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.7    11/12/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.8    11/13/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.9    11/14/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.0    11/15/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.1    11/16/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.2    11/17/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.3    11/18/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.4    11/19/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.5    11/20/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.6    11/21/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.7    11/23/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.8    11/24/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.9    11/25/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.0    11/26/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.1    11/27/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.2    11/28/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.3    11/29/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.4    11/30/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.5    12/01/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.6    12/02/2024    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.7    12/03/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.8    12/04/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.9    12/05/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.0    12/07/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.1    12/08/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.2    12/09/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.3    12/10/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.4    12/11/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.5    12/12/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.6    12/13/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.7    12/14/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.8    12/15/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.9    12/16/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.0    12/17/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.1    12/18/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.2    12/19/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.3    12/20/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.4    12/21/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.5    12/22/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.6    12/23/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.7    12/24/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.8    12/25/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.9    12/26/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.0    12/27/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.1    12/28/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.2    12/29/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.3    12/30/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.4    12/31/2024    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.5    01/01/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.6    01/02/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.7    01/03/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.8    01/04/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.9    01/05/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.0    01/06/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.1    01/07/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.2    01/08/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.3    01/09/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.4    01/10/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.5    01/11/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.6    01/12/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.7    01/13/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.8    01/15/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.9    01/16/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.0    01/17/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.1    01/18/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.2    01/19/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.3    01/20/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.4    01/21/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.5    01/22/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.6    01/23/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.7    01/24/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.8    01/25/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.9    01/27/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.0    01/28/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.1    01/29/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.2    01/30/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.3    02/01/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.4    02/02/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.5    02/03/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.6    02/04/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.7    02/05/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.8    02/07/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.9    02/08/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.0    02/09/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.1    02/10/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.2    02/11/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.3    02/12/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.4    02/13/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.5    02/14/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.6    02/15/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.7    02/16/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.8    02/17/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.9    02/18/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.0    02/19/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.1    02/20/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.2    02/21/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.3    02/22/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.4    02/23/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.5    02/24/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.6    02/25/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.7    02/26/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.8    02/27/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.9    02/28/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.0    03/01/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.1    03/02/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.2    03/03/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.3    03/04/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.4    03/05/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.5    03/06/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.6    03/08/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.7    03/09/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.8    03/10/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.9    03/11/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


19.0    03/12/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


19.1    03/13/2025    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-32149
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cni (CBL-Mariner)
keda (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.1.2-3

2.14.0-1
1.2.0-1
4.0.2-1
None
Azure Linux 3.0 x64 cni (CBL-Mariner)
keda (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.1.2-3

2.14.0-1
1.2.0-1
4.0.2-1
None
CBL Mariner 2.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
cf-cli (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
gh (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.4.0-22

8.4.0-21
1.55.0-20
2.13.0-22
None
CBL Mariner 2.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
cf-cli (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
gh (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.4.0-22

8.4.0-21
1.55.0-20
2.13.0-22
None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-32149 None

CVE-2024-45338 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45338
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/09/2025    

Information published.


0.2    01/12/2025    

Information published.


0.3    01/13/2025    

Information published.


0.4    01/15/2025    

Information published.


0.5    01/16/2025    

Information published.


0.6    01/17/2025    

Information published.


0.7    01/18/2025    

Information published.


0.8    01/19/2025    

Information published.


0.9    01/20/2025    

Information published.


1.0    01/21/2025    

Information published.


1.1    01/22/2025    

Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0


1.2    01/23/2025    

Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.3    01/24/2025    

Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.4    01/25/2025    

Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.5    01/27/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.6    01/28/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.7    01/29/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.8    01/30/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


1.9    02/01/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.0    02/02/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.1    02/03/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.2    02/04/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.3    02/05/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.4    02/07/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.5    02/08/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.6    02/09/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.7    02/10/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.8    02/11/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


2.9    02/12/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.0    02/13/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.1    02/14/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.2    02/15/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.3    02/16/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.4    02/17/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.5    02/18/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.6    02/19/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.7    02/20/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.8    02/21/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


3.9    02/22/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.0    02/23/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.1    02/24/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.2    02/25/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.3    02/26/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.4    02/27/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.5    02/28/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.6    03/01/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.7    03/02/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.8    03/03/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


4.9    03/04/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.0    03/05/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.1    03/06/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.2    03/08/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.3    03/09/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.4    03/10/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.5    03/11/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerd2 to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.6    03/12/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added containerd2 to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


5.7    03/13/2025    

Added kubernetes to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added containerd2 to Azure Linux 3.0 Added cni to Azure Linux 3.0 Added cni-plugins to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added telegraf to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
cni (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1.7.2-3

1.12.13-3
8.7.3-5
1.1.2-4
None
Azure Linux 3.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
cni (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1.7.2-3

1.12.13-3
8.7.3-5
1.1.2-4
None
CBL Mariner 2.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
cni-plugins (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1.4.0-24

1.11.2-17
8.4.0-23
1.3.0-7
None
CBL Mariner 2.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
cni-plugins (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1.4.0-24

1.11.2-17
8.4.0-23
1.3.0-7
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45338 None

CVE-2017-18207 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-18207
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/18/2020    

Information published.


1.6    06/30/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/15/2024    

Information published.


4.9    08/16/2024    

Information published.


5.0    08/17/2024    

Information published.


5.1    08/18/2024    

Information published.


5.2    08/19/2024    

Information published.


5.3    08/20/2024    

Information published.


5.4    08/21/2024    

Information published.


5.5    08/22/2024    

Information published.


5.6    08/23/2024    

Information published.


5.7    08/24/2024    

Information published.


5.8    08/25/2024    

Information published.


5.9    08/26/2024    

Information published.


6.0    08/27/2024    

Information published.


6.1    08/28/2024    

Information published.


6.2    08/29/2024    

Information published.


6.3    08/30/2024    

Information published.


6.4    08/31/2024    

Information published.


6.5    09/01/2024    

Information published.


6.6    09/02/2024    

Information published.


6.7    09/03/2024    

Information published.


6.8    09/05/2024    

Information published.


6.9    09/06/2024    

Information published.


7.0    09/07/2024    

Information published.


7.1    09/08/2024    

Information published.


7.2    09/11/2024    

Information published.


7.3    09/12/2024    

Information published.


7.4    09/13/2024    

Information published.


7.5    09/14/2024    

Information published.


7.6    09/15/2024    

Information published.


7.7    09/16/2024    

Information published.


7.8    09/17/2024    

Information published.


7.9    09/18/2024    

Information published.


8.0    09/19/2024    

Information published.


8.1    09/20/2024    

Information published.


8.2    09/21/2024    

Information published.


8.3    09/22/2024    

Information published.


8.4    09/23/2024    

Information published.


8.5    09/24/2024    

Information published.


8.6    09/25/2024    

Information published.


8.7    09/26/2024    

Information published.


8.8    09/27/2024    

Information published.


8.9    09/28/2024    

Information published.


9.0    09/29/2024    

Information published.


9.1    09/30/2024    

Information published.


9.2    10/01/2024    

Information published.


9.3    10/02/2024    

Information published.


9.4    10/03/2024    

Information published.


9.5    10/04/2024    

Information published.


9.6    10/05/2024    

Information published.


9.7    10/06/2024    

Information published.


9.8    10/07/2024    

Information published.


9.9    10/08/2024    

Information published.


10.0    10/09/2024    

Information published.


10.1    10/10/2024    

Information published.


10.2    10/11/2024    

Information published.


10.3    10/12/2024    

Information published.


10.4    10/13/2024    

Information published.


10.5    10/14/2024    

Information published.


10.6    10/15/2024    

Added python2 to CBL-Mariner 1.0


10.7    10/16/2024    

Added python2 to CBL-Mariner 1.0


10.8    10/17/2024    

Added python2 to CBL-Mariner 1.0


10.9    10/18/2024    

Added python2 to CBL-Mariner 1.0


11.0    10/19/2024    

Added python2 to CBL-Mariner 1.0


11.1    10/20/2024    

Added python2 to CBL-Mariner 1.0


11.2    10/21/2024    

Added python2 to CBL-Mariner 1.0


11.3    10/22/2024    

Added python2 to CBL-Mariner 1.0


11.4    10/23/2024    

Added python2 to CBL-Mariner 1.0


11.5    10/24/2024    

Added python2 to CBL-Mariner 1.0


11.6    10/25/2024    

Added python2 to CBL-Mariner 1.0


11.7    10/26/2024    

Added python2 to CBL-Mariner 1.0


11.8    10/27/2024    

Added python2 to CBL-Mariner 1.0


11.9    10/28/2024    

Added python2 to CBL-Mariner 1.0


12.0    10/29/2024    

Added python2 to CBL-Mariner 1.0


12.1    10/30/2024    

Added python2 to CBL-Mariner 1.0


12.2    10/31/2024    

Added python2 to CBL-Mariner 1.0


12.3    11/01/2024    

Added python2 to CBL-Mariner 1.0


12.4    11/02/2024    

Added python2 to CBL-Mariner 1.0


12.5    11/04/2024    

Added python2 to CBL-Mariner 1.0


12.6    11/05/2024    

Added python2 to CBL-Mariner 1.0


12.7    11/06/2024    

Added python2 to CBL-Mariner 1.0


12.8    11/07/2024    

Added python2 to CBL-Mariner 1.0


12.9    11/08/2024    

Added python2 to CBL-Mariner 1.0


13.0    11/09/2024    

Added python2 to CBL-Mariner 1.0


13.1    11/10/2024    

Added python2 to CBL-Mariner 1.0


13.2    11/11/2024    

Added python2 to CBL-Mariner 1.0


13.3    11/12/2024    

Added python2 to CBL-Mariner 1.0


13.4    11/13/2024    

Added python2 to CBL-Mariner 1.0


13.5    11/14/2024    

Added python2 to CBL-Mariner 1.0


13.6    11/15/2024    

Added python2 to CBL-Mariner 1.0


13.7    11/16/2024    

Added python2 to CBL-Mariner 1.0


13.8    11/17/2024    

Added python2 to CBL-Mariner 1.0


13.9    11/18/2024    

Added python2 to CBL-Mariner 1.0


14.0    11/19/2024    

Added python2 to CBL-Mariner 1.0


14.1    11/20/2024    

Added python2 to CBL-Mariner 1.0


14.2    11/21/2024    

Added python2 to CBL-Mariner 1.0


14.3    11/23/2024    

Added python2 to CBL-Mariner 1.0


14.4    11/24/2024    

Added python2 to CBL-Mariner 1.0


14.5    11/25/2024    

Added python2 to CBL-Mariner 1.0


14.6    11/26/2024    

Added python2 to CBL-Mariner 1.0


14.7    11/27/2024    

Added python2 to CBL-Mariner 1.0


14.8    11/28/2024    

Added python2 to CBL-Mariner 1.0


14.9    11/29/2024    

Added python2 to CBL-Mariner 1.0


15.0    11/30/2024    

Added python2 to CBL-Mariner 1.0


15.1    12/01/2024    

Added python2 to CBL-Mariner 1.0


15.2    12/02/2024    

Added python2 to CBL-Mariner 1.0


15.3    12/03/2024    

Added python2 to CBL-Mariner 1.0


15.4    12/04/2024    

Added python2 to CBL-Mariner 1.0


15.5    12/05/2024    

Added python2 to CBL-Mariner 1.0


15.6    12/07/2024    

Added python2 to CBL-Mariner 1.0


15.7    12/08/2024    

Added python2 to CBL-Mariner 1.0


15.8    12/09/2024    

Added python2 to CBL-Mariner 1.0


15.9    12/10/2024    

Added python2 to CBL-Mariner 1.0


16.0    12/11/2024    

Added python2 to CBL-Mariner 1.0


16.1    12/12/2024    

Added python2 to CBL-Mariner 1.0


16.2    12/13/2024    

Added python2 to CBL-Mariner 1.0


16.3    12/14/2024    

Added python2 to CBL-Mariner 1.0


16.4    12/15/2024    

Added python2 to CBL-Mariner 1.0


16.5    12/16/2024    

Added python2 to CBL-Mariner 1.0


16.6    12/17/2024    

Added python2 to CBL-Mariner 1.0


16.7    12/18/2024    

Added python2 to CBL-Mariner 1.0


16.8    12/19/2024    

Added python2 to CBL-Mariner 1.0


16.9    12/20/2024    

Added python2 to CBL-Mariner 1.0


17.0    12/21/2024    

Added python2 to CBL-Mariner 1.0


17.1    12/22/2024    

Added python2 to CBL-Mariner 1.0


17.2    12/23/2024    

Added python2 to CBL-Mariner 1.0


17.3    12/24/2024    

Added python2 to CBL-Mariner 1.0


17.4    12/25/2024    

Added python2 to CBL-Mariner 1.0


17.5    12/26/2024    

Added python2 to CBL-Mariner 1.0


17.6    12/27/2024    

Added python2 to CBL-Mariner 1.0


17.7    12/28/2024    

Added python2 to CBL-Mariner 1.0


17.8    12/29/2024    

Added python2 to CBL-Mariner 1.0


17.9    12/30/2024    

Added python2 to CBL-Mariner 1.0


18.0    12/31/2024    

Added python2 to CBL-Mariner 1.0


18.1    01/01/2025    

Added python2 to CBL-Mariner 1.0


18.2    01/02/2025    

Added python2 to CBL-Mariner 1.0


18.3    01/03/2025    

Added python2 to CBL-Mariner 1.0


18.4    01/04/2025    

Added python2 to CBL-Mariner 1.0


18.5    01/05/2025    

Added python2 to CBL-Mariner 1.0


18.6    01/06/2025    

Added python2 to CBL-Mariner 1.0


18.7    01/07/2025    

Added python2 to CBL-Mariner 1.0


18.8    01/08/2025    

Added python2 to CBL-Mariner 1.0


18.9    01/09/2025    

Added python2 to CBL-Mariner 1.0


19.0    01/10/2025    

Added python2 to CBL-Mariner 1.0


19.1    01/11/2025    

Added python2 to CBL-Mariner 1.0


19.2    01/12/2025    

Added python2 to CBL-Mariner 1.0


19.3    01/13/2025    

Added python2 to CBL-Mariner 1.0


19.4    01/15/2025    

Added python2 to CBL-Mariner 1.0


19.5    01/16/2025    

Added python2 to CBL-Mariner 1.0


19.6    01/17/2025    

Added python2 to CBL-Mariner 1.0


19.7    01/18/2025    

Added python2 to CBL-Mariner 1.0


19.8    01/19/2025    

Added python2 to CBL-Mariner 1.0


19.9    01/20/2025    

Added python2 to CBL-Mariner 1.0


20.0    01/21/2025    

Added python2 to CBL-Mariner 1.0


20.1    01/22/2025    

Added python2 to CBL-Mariner 1.0


20.2    01/23/2025    

Added python2 to CBL-Mariner 1.0


20.3    01/24/2025    

Added python2 to CBL-Mariner 1.0


20.4    01/25/2025    

Added python2 to CBL-Mariner 1.0


20.5    01/27/2025    

Added python2 to CBL-Mariner 1.0


20.6    01/28/2025    

Added python2 to CBL-Mariner 1.0


20.7    01/29/2025    

Added python2 to CBL-Mariner 1.0


20.8    01/30/2025    

Added python2 to CBL-Mariner 1.0


20.9    02/01/2025    

Added python2 to CBL-Mariner 1.0


21.0    02/02/2025    

Added python2 to CBL-Mariner 1.0


21.1    02/03/2025    

Added python2 to CBL-Mariner 1.0


21.2    02/04/2025    

Added python2 to CBL-Mariner 1.0


21.3    02/05/2025    

Added python2 to CBL-Mariner 1.0


21.4    02/07/2025    

Added python2 to CBL-Mariner 1.0


21.5    02/08/2025    

Added python2 to CBL-Mariner 1.0


21.6    02/09/2025    

Added python2 to CBL-Mariner 1.0


21.7    02/10/2025    

Added python2 to CBL-Mariner 1.0


21.8    02/11/2025    

Added python2 to CBL-Mariner 1.0


21.9    02/12/2025    

Added python2 to CBL-Mariner 1.0


22.0    02/13/2025    

Added python2 to CBL-Mariner 1.0


22.1    02/14/2025    

Added python2 to CBL-Mariner 1.0


22.2    02/15/2025    

Added python2 to CBL-Mariner 1.0


22.3    02/16/2025    

Added python2 to CBL-Mariner 1.0


22.4    02/17/2025    

Added python2 to CBL-Mariner 1.0


22.5    02/18/2025    

Added python2 to CBL-Mariner 1.0


22.6    02/19/2025    

Added python2 to CBL-Mariner 1.0


22.7    02/20/2025    

Added python2 to CBL-Mariner 1.0


22.8    02/21/2025    

Added python2 to CBL-Mariner 1.0


22.9    02/22/2025    

Added python2 to CBL-Mariner 1.0


23.0    02/23/2025    

Added python2 to CBL-Mariner 1.0


23.1    02/24/2025    

Added python2 to CBL-Mariner 1.0


23.2    02/25/2025    

Added python2 to CBL-Mariner 1.0


23.3    02/26/2025    

Added python2 to CBL-Mariner 1.0


23.4    02/27/2025    

Added python2 to CBL-Mariner 1.0


23.5    02/28/2025    

Added python2 to CBL-Mariner 1.0


23.6    03/01/2025    

Added python2 to CBL-Mariner 1.0


23.7    03/02/2025    

Added python2 to CBL-Mariner 1.0


23.8    03/03/2025    

Added python2 to CBL-Mariner 1.0


23.9    03/04/2025    

Added python2 to CBL-Mariner 1.0


24.0    03/05/2025    

Added python2 to CBL-Mariner 1.0


24.1    03/06/2025    

Added python2 to CBL-Mariner 1.0


24.2    03/08/2025    

Added python2 to CBL-Mariner 1.0


24.3    03/09/2025    

Added python2 to CBL-Mariner 1.0


24.4    03/10/2025    

Added python2 to CBL-Mariner 1.0


24.5    03/11/2025    

Added python2 to CBL-Mariner 1.0


24.6    03/12/2025    

Added python2 to CBL-Mariner 1.0


24.7    03/13/2025    

Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-18207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.7.18-5
Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.7.18-5
Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-18207 None

CVE-2017-17522 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-17522
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/18/2020    

Information published.


1.6    06/30/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/15/2024    

Information published.


4.9    08/16/2024    

Information published.


5.0    08/17/2024    

Information published.


5.1    08/18/2024    

Information published.


5.2    08/19/2024    

Information published.


5.3    08/20/2024    

Information published.


5.4    08/21/2024    

Information published.


5.5    08/22/2024    

Information published.


5.6    08/23/2024    

Information published.


5.7    08/24/2024    

Information published.


5.8    08/25/2024    

Information published.


5.9    08/26/2024    

Information published.


6.0    08/27/2024    

Information published.


6.1    08/28/2024    

Information published.


6.2    08/29/2024    

Information published.


6.3    08/30/2024    

Information published.


6.4    08/31/2024    

Information published.


6.5    09/01/2024    

Information published.


6.6    09/02/2024    

Information published.


6.7    09/03/2024    

Information published.


6.8    09/05/2024    

Information published.


6.9    09/06/2024    

Information published.


7.0    09/07/2024    

Information published.


7.1    09/08/2024    

Information published.


7.2    09/11/2024    

Information published.


7.3    09/12/2024    

Information published.


7.4    09/13/2024    

Information published.


7.5    09/14/2024    

Information published.


7.6    09/15/2024    

Information published.


7.7    09/16/2024    

Information published.


7.8    09/17/2024    

Information published.


7.9    09/18/2024    

Information published.


8.0    09/19/2024    

Information published.


8.1    09/20/2024    

Information published.


8.2    09/21/2024    

Information published.


8.3    09/22/2024    

Information published.


8.4    09/23/2024    

Information published.


8.5    09/24/2024    

Information published.


8.6    09/25/2024    

Information published.


8.7    09/26/2024    

Information published.


8.8    09/27/2024    

Information published.


8.9    09/28/2024    

Information published.


9.0    09/29/2024    

Information published.


9.1    09/30/2024    

Information published.


9.2    10/01/2024    

Information published.


9.3    10/02/2024    

Information published.


9.4    10/03/2024    

Information published.


9.5    10/04/2024    

Information published.


9.6    10/05/2024    

Information published.


9.7    10/06/2024    

Information published.


9.8    10/07/2024    

Information published.


9.9    10/08/2024    

Information published.


10.0    10/09/2024    

Information published.


10.1    10/10/2024    

Information published.


10.2    10/11/2024    

Information published.


10.3    10/12/2024    

Information published.


10.4    10/13/2024    

Information published.


10.5    10/14/2024    

Information published.


10.6    10/15/2024    

Added python2 to CBL-Mariner 1.0


10.7    10/16/2024    

Added python2 to CBL-Mariner 1.0


10.8    10/17/2024    

Added python2 to CBL-Mariner 1.0


10.9    10/18/2024    

Added python2 to CBL-Mariner 1.0


11.0    10/19/2024    

Added python2 to CBL-Mariner 1.0


11.1    10/20/2024    

Added python2 to CBL-Mariner 1.0


11.2    10/21/2024    

Added python2 to CBL-Mariner 1.0


11.3    10/22/2024    

Added python2 to CBL-Mariner 1.0


11.4    10/23/2024    

Added python2 to CBL-Mariner 1.0


11.5    10/24/2024    

Added python2 to CBL-Mariner 1.0


11.6    10/25/2024    

Added python2 to CBL-Mariner 1.0


11.7    10/26/2024    

Added python2 to CBL-Mariner 1.0


11.8    10/27/2024    

Added python2 to CBL-Mariner 1.0


11.9    10/28/2024    

Added python2 to CBL-Mariner 1.0


12.0    10/29/2024    

Added python2 to CBL-Mariner 1.0


12.1    10/30/2024    

Added python2 to CBL-Mariner 1.0


12.2    10/31/2024    

Added python2 to CBL-Mariner 1.0


12.3    11/01/2024    

Added python2 to CBL-Mariner 1.0


12.4    11/02/2024    

Added python2 to CBL-Mariner 1.0


12.5    11/04/2024    

Added python2 to CBL-Mariner 1.0


12.6    11/05/2024    

Added python2 to CBL-Mariner 1.0


12.7    11/06/2024    

Added python2 to CBL-Mariner 1.0


12.8    11/07/2024    

Added python2 to CBL-Mariner 1.0


12.9    11/08/2024    

Added python2 to CBL-Mariner 1.0


13.0    11/09/2024    

Added python2 to CBL-Mariner 1.0


13.1    11/10/2024    

Added python2 to CBL-Mariner 1.0


13.2    11/11/2024    

Added python2 to CBL-Mariner 1.0


13.3    11/12/2024    

Added python2 to CBL-Mariner 1.0


13.4    11/13/2024    

Added python2 to CBL-Mariner 1.0


13.5    11/14/2024    

Added python2 to CBL-Mariner 1.0


13.6    11/15/2024    

Added python2 to CBL-Mariner 1.0


13.7    11/16/2024    

Added python2 to CBL-Mariner 1.0


13.8    11/17/2024    

Added python2 to CBL-Mariner 1.0


13.9    11/18/2024    

Added python2 to CBL-Mariner 1.0


14.0    11/19/2024    

Added python2 to CBL-Mariner 1.0


14.1    11/20/2024    

Added python2 to CBL-Mariner 1.0


14.2    11/21/2024    

Added python2 to CBL-Mariner 1.0


14.3    11/23/2024    

Added python2 to CBL-Mariner 1.0


14.4    11/24/2024    

Added python2 to CBL-Mariner 1.0


14.5    11/25/2024    

Added python2 to CBL-Mariner 1.0


14.6    11/26/2024    

Added python2 to CBL-Mariner 1.0


14.7    11/27/2024    

Added python2 to CBL-Mariner 1.0


14.8    11/28/2024    

Added python2 to CBL-Mariner 1.0


14.9    11/29/2024    

Added python2 to CBL-Mariner 1.0


15.0    11/30/2024    

Added python2 to CBL-Mariner 1.0


15.1    12/01/2024    

Added python2 to CBL-Mariner 1.0


15.2    12/02/2024    

Added python2 to CBL-Mariner 1.0


15.3    12/03/2024    

Added python2 to CBL-Mariner 1.0


15.4    12/04/2024    

Added python2 to CBL-Mariner 1.0


15.5    12/05/2024    

Added python2 to CBL-Mariner 1.0


15.6    12/07/2024    

Added python2 to CBL-Mariner 1.0


15.7    12/08/2024    

Added python2 to CBL-Mariner 1.0


15.8    12/09/2024    

Added python2 to CBL-Mariner 1.0


15.9    12/10/2024    

Added python2 to CBL-Mariner 1.0


16.0    12/11/2024    

Added python2 to CBL-Mariner 1.0


16.1    12/12/2024    

Added python2 to CBL-Mariner 1.0


16.2    12/13/2024    

Added python2 to CBL-Mariner 1.0


16.3    12/14/2024    

Added python2 to CBL-Mariner 1.0


16.4    12/15/2024    

Added python2 to CBL-Mariner 1.0


16.5    12/16/2024    

Added python2 to CBL-Mariner 1.0


16.6    12/17/2024    

Added python2 to CBL-Mariner 1.0


16.7    12/18/2024    

Added python2 to CBL-Mariner 1.0


16.8    12/19/2024    

Added python2 to CBL-Mariner 1.0


16.9    12/20/2024    

Added python2 to CBL-Mariner 1.0


17.0    12/21/2024    

Added python2 to CBL-Mariner 1.0


17.1    12/22/2024    

Added python2 to CBL-Mariner 1.0


17.2    12/23/2024    

Added python2 to CBL-Mariner 1.0


17.3    12/24/2024    

Added python2 to CBL-Mariner 1.0


17.4    12/25/2024    

Added python2 to CBL-Mariner 1.0


17.5    12/26/2024    

Added python2 to CBL-Mariner 1.0


17.6    12/27/2024    

Added python2 to CBL-Mariner 1.0


17.7    12/28/2024    

Added python2 to CBL-Mariner 1.0


17.8    12/29/2024    

Added python2 to CBL-Mariner 1.0


17.9    12/30/2024    

Added python2 to CBL-Mariner 1.0


18.0    12/31/2024    

Added python2 to CBL-Mariner 1.0


18.1    01/01/2025    

Added python2 to CBL-Mariner 1.0


18.2    01/02/2025    

Added python2 to CBL-Mariner 1.0


18.3    01/03/2025    

Added python2 to CBL-Mariner 1.0


18.4    01/04/2025    

Added python2 to CBL-Mariner 1.0


18.5    01/05/2025    

Added python2 to CBL-Mariner 1.0


18.6    01/06/2025    

Added python2 to CBL-Mariner 1.0


18.7    01/07/2025    

Added python2 to CBL-Mariner 1.0


18.8    01/08/2025    

Added python2 to CBL-Mariner 1.0


18.9    01/09/2025    

Added python2 to CBL-Mariner 1.0


19.0    01/10/2025    

Added python2 to CBL-Mariner 1.0


19.1    01/11/2025    

Added python2 to CBL-Mariner 1.0


19.2    01/12/2025    

Added python2 to CBL-Mariner 1.0


19.3    01/13/2025    

Added python2 to CBL-Mariner 1.0


19.4    01/15/2025    

Added python2 to CBL-Mariner 1.0


19.5    01/16/2025    

Added python2 to CBL-Mariner 1.0


19.6    01/17/2025    

Added python2 to CBL-Mariner 1.0


19.7    01/18/2025    

Added python2 to CBL-Mariner 1.0


19.8    01/19/2025    

Added python2 to CBL-Mariner 1.0


19.9    01/20/2025    

Added python2 to CBL-Mariner 1.0


20.0    01/21/2025    

Added python2 to CBL-Mariner 1.0


20.1    01/22/2025    

Added python2 to CBL-Mariner 1.0


20.2    01/23/2025    

Added python2 to CBL-Mariner 1.0


20.3    01/24/2025    

Added python2 to CBL-Mariner 1.0


20.4    01/25/2025    

Added python2 to CBL-Mariner 1.0


20.5    01/27/2025    

Added python2 to CBL-Mariner 1.0


20.6    01/28/2025    

Added python2 to CBL-Mariner 1.0


20.7    01/29/2025    

Added python2 to CBL-Mariner 1.0


20.8    01/30/2025    

Added python2 to CBL-Mariner 1.0


20.9    02/01/2025    

Added python2 to CBL-Mariner 1.0


21.0    02/02/2025    

Added python2 to CBL-Mariner 1.0


21.1    02/03/2025    

Added python2 to CBL-Mariner 1.0


21.2    02/04/2025    

Added python2 to CBL-Mariner 1.0


21.3    02/05/2025    

Added python2 to CBL-Mariner 1.0


21.4    02/07/2025    

Added python2 to CBL-Mariner 1.0


21.5    02/08/2025    

Added python2 to CBL-Mariner 1.0


21.6    02/09/2025    

Added python2 to CBL-Mariner 1.0


21.7    02/10/2025    

Added python2 to CBL-Mariner 1.0


21.8    02/11/2025    

Added python2 to CBL-Mariner 1.0


21.9    02/12/2025    

Added python2 to CBL-Mariner 1.0


22.0    02/13/2025    

Added python2 to CBL-Mariner 1.0


22.1    02/14/2025    

Added python2 to CBL-Mariner 1.0


22.2    02/15/2025    

Added python2 to CBL-Mariner 1.0


22.3    02/16/2025    

Added python2 to CBL-Mariner 1.0


22.4    02/17/2025    

Added python2 to CBL-Mariner 1.0


22.5    02/18/2025    

Added python2 to CBL-Mariner 1.0


22.6    02/19/2025    

Added python2 to CBL-Mariner 1.0


22.7    02/20/2025    

Added python2 to CBL-Mariner 1.0


22.8    02/21/2025    

Added python2 to CBL-Mariner 1.0


22.9    02/22/2025    

Added python2 to CBL-Mariner 1.0


23.0    02/23/2025    

Added python2 to CBL-Mariner 1.0


23.1    02/24/2025    

Added python2 to CBL-Mariner 1.0


23.2    02/25/2025    

Added python2 to CBL-Mariner 1.0


23.3    02/26/2025    

Added python2 to CBL-Mariner 1.0


23.4    02/27/2025    

Added python2 to CBL-Mariner 1.0


23.5    02/28/2025    

Added python2 to CBL-Mariner 1.0


23.6    03/01/2025    

Added python2 to CBL-Mariner 1.0


23.7    03/02/2025    

Added python2 to CBL-Mariner 1.0


23.8    03/03/2025    

Added python2 to CBL-Mariner 1.0


23.9    03/04/2025    

Added python2 to CBL-Mariner 1.0


24.0    03/05/2025    

Added python2 to CBL-Mariner 1.0


24.1    03/06/2025    

Added python2 to CBL-Mariner 1.0


24.2    03/08/2025    

Added python2 to CBL-Mariner 1.0


24.3    03/09/2025    

Added python2 to CBL-Mariner 1.0


24.4    03/10/2025    

Added python2 to CBL-Mariner 1.0


24.5    03/11/2025    

Added python2 to CBL-Mariner 1.0


24.6    03/12/2025    

Added python2 to CBL-Mariner 1.0


24.7    03/13/2025    

Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-17522
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.7.18-3
Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.7.18-3
Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-17522 None

CVE-2007-4559 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2007-4559
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/25/2020    

Information published.


1.1    12/16/2021    

Added python3 to CBL-Mariner 2.0


1.7    06/30/2024    

Information published.


1.8    07/08/2024    

Information published.


1.9    07/09/2024    

Information published.


2.0    07/10/2024    

Information published.


2.1    07/12/2024    

Information published.


2.2    07/13/2024    

Information published.


2.3    07/14/2024    

Information published.


2.4    07/15/2024    

Information published.


2.5    07/16/2024    

Information published.


2.6    07/17/2024    

Information published.


2.7    07/19/2024    

Information published.


2.8    07/20/2024    

Information published.


2.9    07/21/2024    

Information published.


3.0    07/22/2024    

Information published.


3.1    07/23/2024    

Information published.


3.2    07/24/2024    

Information published.


3.3    07/25/2024    

Information published.


3.4    07/26/2024    

Information published.


3.5    07/27/2024    

Information published.


3.6    07/28/2024    

Information published.


3.7    07/29/2024    

Information published.


3.8    08/02/2024    

Information published.


3.9    08/03/2024    

Information published.


4.0    08/04/2024    

Information published.


4.1    08/05/2024    

Information published.


4.2    08/06/2024    

Information published.


4.3    08/07/2024    

Information published.


4.4    08/08/2024    

Information published.


4.5    08/09/2024    

Information published.


4.6    08/10/2024    

Information published.


4.7    08/11/2024    

Information published.


4.8    08/12/2024    

Information published.


4.9    08/15/2024    

Information published.


5.0    08/16/2024    

Information published.


5.1    08/17/2024    

Information published.


5.2    08/18/2024    

Information published.


5.3    08/19/2024    

Information published.


5.4    08/20/2024    

Information published.


5.5    08/21/2024    

Information published.


5.6    08/22/2024    

Information published.


5.7    08/23/2024    

Information published.


5.8    08/24/2024    

Information published.


5.9    08/25/2024    

Information published.


6.0    08/26/2024    

Information published.


6.1    08/27/2024    

Information published.


6.2    08/28/2024    

Information published.


6.3    08/29/2024    

Information published.


6.4    08/30/2024    

Information published.


6.5    08/31/2024    

Information published.


6.6    09/01/2024    

Information published.


6.7    09/02/2024    

Information published.


6.8    09/03/2024    

Information published.


6.9    09/05/2024    

Information published.


7.0    09/06/2024    

Information published.


7.1    09/07/2024    

Information published.


7.2    09/08/2024    

Information published.


7.3    09/11/2024    

Information published.


7.4    09/12/2024    

Information published.


7.5    09/13/2024    

Information published.


7.6    09/14/2024    

Information published.


7.7    09/15/2024    

Information published.


7.8    09/16/2024    

Information published.


7.9    09/17/2024    

Information published.


8.0    09/18/2024    

Information published.


8.1    09/19/2024    

Information published.


8.2    09/20/2024    

Information published.


8.3    09/21/2024    

Information published.


8.4    09/22/2024    

Information published.


8.5    09/23/2024    

Information published.


8.6    09/24/2024    

Information published.


8.7    09/25/2024    

Information published.


8.8    09/26/2024    

Information published.


8.9    09/27/2024    

Information published.


9.0    09/28/2024    

Information published.


9.1    09/29/2024    

Information published.


9.2    09/30/2024    

Information published.


9.3    10/01/2024    

Information published.


9.4    10/02/2024    

Information published.


9.5    10/03/2024    

Information published.


9.6    10/04/2024    

Information published.


9.7    10/05/2024    

Information published.


9.8    10/06/2024    

Information published.


9.9    10/07/2024    

Information published.


10.0    10/08/2024    

Information published.


10.1    10/09/2024    

Information published.


10.2    10/10/2024    

Information published.


10.3    10/11/2024    

Information published.


10.4    10/12/2024    

Information published.


10.5    10/13/2024    

Information published.


10.6    10/14/2024    

Information published.


10.7    10/15/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


10.8    10/16/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


10.9    10/17/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.0    10/18/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.1    10/19/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.2    10/20/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.3    10/21/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.4    10/22/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.5    10/23/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.6    10/24/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.7    10/25/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.8    10/26/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.9    10/27/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.0    10/28/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.1    10/29/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.2    10/30/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.3    10/31/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.4    11/01/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.5    11/02/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.6    11/04/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.7    11/05/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.8    11/06/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.9    11/07/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.0    11/08/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.1    11/09/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.2    11/10/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.3    11/11/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.4    11/12/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.5    11/13/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.6    11/14/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.7    11/15/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.8    11/16/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.9    11/17/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.0    11/18/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.1    11/19/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.2    11/20/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.3    11/21/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.4    11/23/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.5    11/24/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.6    11/25/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.7    11/26/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.8    11/27/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.9    11/28/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.0    11/29/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.1    11/30/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.2    12/01/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.3    12/02/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.4    12/03/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.5    12/04/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.6    12/05/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.7    12/07/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.8    12/08/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.9    12/09/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.0    12/10/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.1    12/11/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.2    12/12/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.3    12/13/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.4    12/14/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.5    12/15/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.6    12/16/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.7    12/17/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.8    12/18/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.9    12/19/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.0    12/20/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.1    12/21/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.2    12/22/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.3    12/23/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.4    12/24/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.5    12/25/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.6    12/26/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.7    12/27/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.8    12/28/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.9    12/29/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.0    12/30/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.1    12/31/2024    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.2    01/01/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.3    01/02/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.4    01/03/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.5    01/04/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.6    01/05/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.7    01/06/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.8    01/07/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.9    01/08/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.0    01/09/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.1    01/10/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.2    01/11/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.3    01/12/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.4    01/13/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.5    01/15/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.6    01/16/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.7    01/17/2025    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.8    01/18/2025    

Added python3 to CBL-Mariner 2.0


19.9    01/19/2025    

Added python3 to CBL-Mariner 2.0


20.0    01/20/2025    

Added python3 to CBL-Mariner 2.0


20.1    01/21/2025    

Added python3 to CBL-Mariner 2.0


20.2    01/22/2025    

Added python3 to CBL-Mariner 2.0


20.3    01/23/2025    

Added python3 to CBL-Mariner 2.0


20.4    01/24/2025    

Added python3 to CBL-Mariner 2.0


20.5    01/25/2025    

Added python3 to CBL-Mariner 2.0


20.6    01/27/2025    

Added python3 to CBL-Mariner 2.0


20.7    01/28/2025    

Added python3 to CBL-Mariner 2.0


20.8    01/29/2025    

Added python3 to CBL-Mariner 2.0


20.9    01/30/2025    

Added python3 to CBL-Mariner 2.0


21.0    02/01/2025    

Added python3 to CBL-Mariner 2.0


21.1    02/02/2025    

Added python3 to CBL-Mariner 2.0


21.2    02/03/2025    

Added python3 to CBL-Mariner 2.0


21.3    02/04/2025    

Added python3 to CBL-Mariner 2.0


21.4    02/05/2025    

Added python3 to CBL-Mariner 2.0


21.5    02/07/2025    

Added python3 to CBL-Mariner 2.0


21.6    02/08/2025    

Added python3 to CBL-Mariner 2.0


21.7    02/09/2025    

Added python3 to CBL-Mariner 2.0


21.8    02/10/2025    

Added python3 to CBL-Mariner 2.0


21.9    02/11/2025    

Added python3 to CBL-Mariner 2.0


22.0    02/12/2025    

Added python3 to CBL-Mariner 2.0


22.1    02/13/2025    

Added python3 to CBL-Mariner 2.0


22.2    02/14/2025    

Added python3 to CBL-Mariner 2.0


22.3    02/15/2025    

Added python3 to CBL-Mariner 2.0


22.4    02/16/2025    

Added python3 to CBL-Mariner 2.0


22.5    02/17/2025    

Added python3 to CBL-Mariner 2.0


22.6    02/18/2025    

Added python3 to CBL-Mariner 2.0


22.7    02/19/2025    

Added python3 to CBL-Mariner 2.0


22.8    02/20/2025    

Added python3 to CBL-Mariner 2.0


22.9    02/21/2025    

Added python3 to CBL-Mariner 2.0


23.0    02/22/2025    

Added python3 to CBL-Mariner 2.0


23.1    02/23/2025    

Added python3 to CBL-Mariner 2.0


23.2    02/24/2025    

Added python3 to CBL-Mariner 2.0


23.3    02/25/2025    

Added python3 to CBL-Mariner 2.0


23.4    02/26/2025    

Added python3 to CBL-Mariner 2.0


23.5    02/27/2025    

Added python3 to CBL-Mariner 2.0


23.6    02/28/2025    

Added python3 to CBL-Mariner 2.0


23.7    03/01/2025    

Added python3 to CBL-Mariner 2.0


23.8    03/02/2025    

Added python3 to CBL-Mariner 2.0


23.9    03/03/2025    

Added python3 to CBL-Mariner 2.0


24.0    03/04/2025    

Added python3 to CBL-Mariner 2.0


24.1    03/05/2025    

Added python3 to CBL-Mariner 2.0


24.2    03/06/2025    

Added python3 to CBL-Mariner 2.0


24.3    03/08/2025    

Added python3 to CBL-Mariner 2.0


24.4    03/09/2025    

Added python3 to CBL-Mariner 2.0


24.5    03/10/2025    

Added python3 to CBL-Mariner 2.0


24.6    03/11/2025    

Added python3 to CBL-Mariner 2.0


24.7    03/12/2025    

Added python3 to CBL-Mariner 2.0


24.8    03/13/2025    

Added python3 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2007-4559
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.7.18-5
Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.7.18-5
Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9.19-1
Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9.19-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2007-4559 None

CVE-2025-1176 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1176
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5/TemporalScore:5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/17/2025    

Information published.


0.2    02/26/2025    

Information published.


0.3    02/28/2025    

Information published.


0.4    03/01/2025    

Information published.


0.5    03/02/2025    

Information published.


0.6    03/03/2025    

Information published.


0.7    03/04/2025    

Information published.


0.8    03/05/2025    

Information published.


0.9    03/06/2025    

Information published.


1.0    03/08/2025    

Information published.


1.1    03/09/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.2    03/10/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.3    03/11/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.4    03/12/2025    

Added binutils to CBL-Mariner 2.0 Added binutils to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.41-3
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.41-3
Unknown None
CBL Mariner 2.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.37-12
Unknown None
CBL Mariner 2.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.37-12
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1176 None

CVE-2025-1182 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1182
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5/TemporalScore:5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/17/2025    

Information published.


0.2    02/26/2025    

Information published.


0.3    02/28/2025    

Information published.


0.4    03/01/2025    

Information published.


0.5    03/02/2025    

Information published.


0.6    03/03/2025    

Information published.


0.7    03/04/2025    

Information published.


0.8    03/05/2025    

Information published.


0.9    03/06/2025    

Information published.


1.0    03/08/2025    

Information published.


1.1    03/09/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.2    03/10/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.3    03/11/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.4    03/12/2025    

Added binutils to CBL-Mariner 2.0 Added binutils to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1182
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.41-3
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.41-3
Unknown None
CBL Mariner 2.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.37-12
Unknown None
CBL Mariner 2.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.37-12
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1182 None

CVE-2025-1181 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1181
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5/TemporalScore:5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/17/2025    

Information published.


0.2    02/26/2025    

Information published.


0.3    02/28/2025    

Information published.


0.4    03/01/2025    

Information published.


0.5    03/02/2025    

Information published.


0.6    03/03/2025    

Information published.


0.7    03/04/2025    

Information published.


0.8    03/05/2025    

Information published.


0.9    03/06/2025    

Information published.


1.0    03/08/2025    

Information published.


1.1    03/09/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.2    03/10/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.3    03/11/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.4    03/12/2025    

Added binutils to CBL-Mariner 2.0 Added binutils to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.41-3
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.41-3
Unknown None
CBL Mariner 2.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.37-12
Unknown None
CBL Mariner 2.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2.37-12
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1181 None

CVE-2025-1178 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1178
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.6/TemporalScore:5.6
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/23/2025    

Information published.


0.2    02/26/2025    

Information published.


0.3    02/28/2025    

Information published.


0.4    03/01/2025    

Information published.


0.5    03/02/2025    

Information published.


0.6    03/03/2025    

Information published.


0.7    03/04/2025    

Information published.


0.8    03/05/2025    

Information published.


0.9    03/06/2025    

Information published.


1.0    03/08/2025    

Information published.


1.1    03/09/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.2    03/10/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


1.3    03/11/2025    

Added binutils to Azure Linux 3.0 Added binutils to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1178
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2.41-3
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2.41-3
Unknown None
CBL Mariner 2.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2.37-13
Unknown None
CBL Mariner 2.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2.37-13
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1178 None

CVE-2015-9251 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2015-9251
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    02/03/2025    

Added slf4j to Azure Linux 3.0


1.2    02/04/2025    

Added slf4j to Azure Linux 3.0


1.3    02/05/2025    

Added slf4j to Azure Linux 3.0


1.4    02/07/2025    

Added slf4j to Azure Linux 3.0


1.5    02/08/2025    

Added slf4j to Azure Linux 3.0


1.6    02/09/2025    

Added slf4j to Azure Linux 3.0


1.7    02/10/2025    

Added slf4j to Azure Linux 3.0


1.8    02/11/2025    

Added slf4j to Azure Linux 3.0


1.9    02/12/2025    

Added slf4j to Azure Linux 3.0


2.0    02/13/2025    

Added slf4j to Azure Linux 3.0


2.1    02/14/2025    

Added slf4j to Azure Linux 3.0


2.2    02/15/2025    

Added slf4j to Azure Linux 3.0


2.3    02/16/2025    

Added slf4j to Azure Linux 3.0


2.4    02/17/2025    

Added slf4j to Azure Linux 3.0


2.5    02/18/2025    

Added slf4j to Azure Linux 3.0


2.6    02/19/2025    

Added slf4j to Azure Linux 3.0


2.7    02/20/2025    

Added slf4j to Azure Linux 3.0


2.8    02/21/2025    

Added slf4j to Azure Linux 3.0


2.9    02/22/2025    

Added slf4j to Azure Linux 3.0


3.0    02/23/2025    

Added slf4j to Azure Linux 3.0


3.1    02/24/2025    

Added slf4j to Azure Linux 3.0


3.2    02/25/2025    

Added slf4j to Azure Linux 3.0


3.3    02/26/2025    

Added slf4j to Azure Linux 3.0


3.4    02/27/2025    

Added slf4j to Azure Linux 3.0


3.5    02/28/2025    

Added slf4j to Azure Linux 3.0


3.6    03/01/2025    

Added slf4j to Azure Linux 3.0


3.7    03/02/2025    

Added slf4j to Azure Linux 3.0


3.8    03/03/2025    

Added slf4j to Azure Linux 3.0


3.9    03/04/2025    

Added slf4j to Azure Linux 3.0


4.0    03/05/2025    

Added slf4j to Azure Linux 3.0


4.1    03/06/2025    

Added slf4j to Azure Linux 3.0


4.2    03/08/2025    

Added slf4j to Azure Linux 3.0


4.3    03/09/2025    

Added slf4j to Azure Linux 3.0


4.4    03/10/2025    

Added slf4j to Azure Linux 3.0


4.5    03/11/2025    

Added slf4j to Azure Linux 3.0


4.6    03/12/2025    

Added slf4j to Azure Linux 3.0


4.7    03/13/2025    

Added slf4j to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2015-9251
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM slf4j (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.0.7-1
Unknown None
Azure Linux 3.0 x64 slf4j (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.0.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2015-9251 None

CVE-2020-22217 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2020-22217
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/04/2023    

Information published.


1.1    06/30/2024    

Information published.


1.2    02/03/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.3    02/04/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.4    02/05/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.5    02/07/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.6    02/08/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.7    02/09/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.8    02/10/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


1.9    02/11/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.0    02/12/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.1    02/13/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.2    02/14/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.3    02/15/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.4    02/16/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.5    02/17/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.6    02/18/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.7    02/19/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.8    02/20/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


2.9    02/21/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.0    02/22/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.1    02/23/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.2    02/24/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.3    02/25/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.4    02/26/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.5    02/27/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.6    02/28/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.7    03/01/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.8    03/02/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


3.9    03/03/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.0    03/04/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.1    03/05/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.2    03/06/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.3    03/08/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.4    03/09/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.5    03/10/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.6    03/11/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.7    03/12/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


4.8    03/13/2025    

Added grpc to Azure Linux 3.0 Added python-gevent to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2020-22217
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM grpc (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1.62.0-2
Unknown None
Azure Linux 3.0 x64 grpc (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1.62.0-2
Unknown None
CBL Mariner 2.0 ARM python-gevent (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
21.1.2-1
Unknown None
CBL Mariner 2.0 x64 python-gevent (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
21.1.2-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2020-22217 None

CVE-2021-24032 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-24032
MITRE
NVD

Issuing CNA: cve-assign@fb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/30/2021    

Information published.


1.1    04/08/2024    

Added ceph to CBL-Mariner 2.0


1.2    12/03/2024    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.3    02/27/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.4    02/28/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.5    03/01/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.6    03/02/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.7    03/03/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.8    03/04/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


1.9    03/05/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.0    03/06/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.1    03/08/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.2    03/09/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.3    03/10/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.4    03/11/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.5    03/12/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


2.6    03/13/2025    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-24032
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
CBL Mariner 1.0 ARM zstd (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1.4.9-1
Unknown None
CBL Mariner 1.0 x64 zstd (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1.4.9-1
Unknown None
CBL Mariner 2.0 ARM ceph (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
16.2.10-3
Unknown None
CBL Mariner 2.0 x64 ceph (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
16.2.10-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-24032 None

CVE-2024-25629 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-25629
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02/26/2024    

Information published.


1.1    06/30/2024    

Information published.


1.2    08/29/2024    

Information published.


1.3    08/30/2024    

Information published.


1.4    08/31/2024    

Information published.


1.5    09/01/2024    

Information published.


1.6    09/02/2024    

Information published.


1.7    09/03/2024    

Information published.


1.8    09/05/2024    

Information published.


1.9    09/06/2024    

Information published.


2.0    09/07/2024    

Information published.


2.1    09/08/2024    

Information published.


2.2    09/11/2024    

Information published.


2.3    10/22/2024    

Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0 Added fluent-bit to Azure Linux 3.0 Added c-ares to Azure Linux 3.0 Added nodejs to Azure Linux 3.0


2.4    11/09/2024    

Added python-gevent to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added c-ares to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


2.5    02/08/2025    

Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0 Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0


2.6    02/23/2025    

Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0 Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0


2.7    02/27/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


2.8    02/28/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


2.9    03/01/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.0    03/02/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.1    03/03/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.2    03/04/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.3    03/05/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.4    03/06/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.5    03/08/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.6    03/09/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.7    03/10/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.8    03/11/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


3.9    03/12/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


4.0    03/13/2025    

Added c-ares to Azure Linux 3.0 Added fluent-bit to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added c-ares to CBL-Mariner 2.0 Added grpc to CBL-Mariner 2.0 Added fluent-bit to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-25629
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM c-ares (CBL-Mariner)
fluent-bit (CBL-Mariner)
nodejs (CBL-Mariner)
python-gevent (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.30.0-1

3.0.6-1
20.14.0-1
23.9.1-4
None
Azure Linux 3.0 x64 c-ares (CBL-Mariner)
fluent-bit (CBL-Mariner)
nodejs (CBL-Mariner)
python-gevent (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.30.0-1

3.0.6-1
20.14.0-1
23.9.1-4
None
CBL Mariner 2.0 ARM c-ares (CBL-Mariner)
fluent-bit (CBL-Mariner)
grpc (CBL-Mariner)
nodejs18 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.19.1-2

2.2.3-1
1.42.0-9
18.20.2-1
None
CBL Mariner 2.0 x64 c-ares (CBL-Mariner)
fluent-bit (CBL-Mariner)
grpc (CBL-Mariner)
nodejs18 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.19.1-2

2.2.3-1
1.42.0-9
18.20.2-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-25629 None

CVE-2024-32465 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32465
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05/17/2024    

Information published.


1.1    06/30/2024    

Information published.


1.2    08/29/2024    

Information published.


1.3    08/30/2024    

Information published.


1.4    08/31/2024    

Information published.


1.5    09/01/2024    

Information published.


1.6    09/02/2024    

Information published.


1.7    09/03/2024    

Information published.


1.8    09/05/2024    

Information published.


1.9    09/06/2024    

Information published.


2.0    09/07/2024    

Information published.


2.1    09/08/2024    

Information published.


2.2    09/11/2024    

Information published.


2.3    09/12/2024    

Information published.


2.4    09/13/2024    

Information published.


2.5    09/14/2024    

Information published.


2.6    09/15/2024    

Information published.


2.7    09/16/2024    

Information published.


2.8    09/17/2024    

Information published.


2.9    09/18/2024    

Information published.


3.0    09/19/2024    

Information published.


3.1    09/20/2024    

Information published.


3.2    09/21/2024    

Information published.


3.3    09/22/2024    

Information published.


3.4    09/23/2024    

Information published.


3.5    09/24/2024    

Information published.


3.6    09/25/2024    

Information published.


3.7    09/26/2024    

Information published.


3.8    09/27/2024    

Information published.


3.9    09/28/2024    

Information published.


4.0    09/29/2024    

Information published.


4.1    09/30/2024    

Information published.


4.2    10/01/2024    

Information published.


4.3    10/02/2024    

Information published.


4.4    10/03/2024    

Information published.


4.5    10/04/2024    

Information published.


4.6    10/05/2024    

Information published.


4.7    10/06/2024    

Information published.


4.8    10/07/2024    

Information published.


4.9    10/08/2024    

Information published.


5.0    10/09/2024    

Information published.


5.1    10/10/2024    

Information published.


5.2    10/11/2024    

Information published.


5.3    10/12/2024    

Information published.


5.4    10/13/2024    

Information published.


5.5    10/14/2024    

Information published.


5.6    10/15/2024    

Added git to CBL-Mariner 2.0


5.7    10/16/2024    

Added git to CBL-Mariner 2.0


5.8    10/17/2024    

Added git to CBL-Mariner 2.0


5.9    10/18/2024    

Added git to CBL-Mariner 2.0


6.0    10/19/2024    

Added git to CBL-Mariner 2.0


6.1    10/20/2024    

Added git to CBL-Mariner 2.0


6.2    10/21/2024    

Added git to CBL-Mariner 2.0


6.3    10/22/2024    

Added git to CBL-Mariner 2.0


6.4    10/23/2024    

Added git to CBL-Mariner 2.0


6.5    10/24/2024    

Added git to CBL-Mariner 2.0


6.6    10/25/2024    

Added git to CBL-Mariner 2.0


6.7    10/26/2024    

Added git to CBL-Mariner 2.0


6.8    10/27/2024    

Added git to CBL-Mariner 2.0


6.9    10/28/2024    

Added git to CBL-Mariner 2.0


7.0    10/29/2024    

Added git to CBL-Mariner 2.0


7.1    10/30/2024    

Added git to CBL-Mariner 2.0


7.2    10/31/2024    

Added git to CBL-Mariner 2.0


7.3    11/01/2024    

Added git to CBL-Mariner 2.0


7.4    11/02/2024    

Added git to CBL-Mariner 2.0


7.5    11/04/2024    

Added git to CBL-Mariner 2.0


7.6    11/05/2024    

Added git to CBL-Mariner 2.0


7.7    11/06/2024    

Added git to CBL-Mariner 2.0


7.8    11/07/2024    

Added git to CBL-Mariner 2.0


7.9    11/08/2024    

Added git to CBL-Mariner 2.0


8.0    11/09/2024    

Added git to CBL-Mariner 2.0


8.1    11/10/2024    

Added git to CBL-Mariner 2.0


8.2    11/11/2024    

Added git to CBL-Mariner 2.0


8.3    11/12/2024    

Added git to CBL-Mariner 2.0


8.4    11/13/2024    

Added git to CBL-Mariner 2.0


8.5    11/14/2024    

Added git to CBL-Mariner 2.0


8.6    11/15/2024    

Added git to CBL-Mariner 2.0


8.7    11/16/2024    

Added git to CBL-Mariner 2.0


8.8    11/17/2024    

Added git to CBL-Mariner 2.0


8.9    11/18/2024    

Added git to CBL-Mariner 2.0


9.0    11/19/2024    

Added git to CBL-Mariner 2.0


9.1    11/20/2024    

Added git to CBL-Mariner 2.0


9.2    11/21/2024    

Added git to CBL-Mariner 2.0


9.3    11/23/2024    

Added git to CBL-Mariner 2.0


9.4    11/24/2024    

Added git to CBL-Mariner 2.0


9.5    11/25/2024    

Added git to CBL-Mariner 2.0


9.6    11/26/2024    

Added git to CBL-Mariner 2.0


9.7    11/27/2024    

Added git to CBL-Mariner 2.0


9.8    11/28/2024    

Added git to CBL-Mariner 2.0


9.9    11/29/2024    

Added git to CBL-Mariner 2.0


10.0    11/30/2024    

Added git to CBL-Mariner 2.0


10.1    12/01/2024    

Added git to CBL-Mariner 2.0


10.2    12/02/2024    

Added git to CBL-Mariner 2.0


10.3    12/03/2024    

Added git to CBL-Mariner 2.0


10.4    12/04/2024    

Added git to CBL-Mariner 2.0


10.5    12/05/2024    

Added git to CBL-Mariner 2.0


10.6    12/07/2024    

Added git to CBL-Mariner 2.0


10.7    12/08/2024    

Added git to CBL-Mariner 2.0


10.8    12/09/2024    

Added git to CBL-Mariner 2.0


10.9    12/10/2024    

Added git to CBL-Mariner 2.0


11.0    12/11/2024    

Added git to CBL-Mariner 2.0


11.1    12/12/2024    

Added git to CBL-Mariner 2.0


11.2    12/13/2024    

Added git to CBL-Mariner 2.0


11.3    12/14/2024    

Added git to CBL-Mariner 2.0


11.4    12/15/2024    

Added git to CBL-Mariner 2.0


11.5    12/16/2024    

Added git to CBL-Mariner 2.0


11.6    12/17/2024    

Added git to CBL-Mariner 2.0


11.7    12/18/2024    

Added git to CBL-Mariner 2.0


11.8    12/19/2024    

Added git to CBL-Mariner 2.0


11.9    12/20/2024    

Added git to CBL-Mariner 2.0


12.0    12/21/2024    

Added git to CBL-Mariner 2.0


12.1    12/22/2024    

Added git to CBL-Mariner 2.0


12.2    12/23/2024    

Added git to CBL-Mariner 2.0


12.3    12/24/2024    

Added git to CBL-Mariner 2.0


12.4    12/25/2024    

Added git to CBL-Mariner 2.0


12.5    12/26/2024    

Added git to CBL-Mariner 2.0


12.6    12/27/2024    

Added git to CBL-Mariner 2.0


12.7    12/28/2024    

Added git to CBL-Mariner 2.0


12.8    12/29/2024    

Added git to CBL-Mariner 2.0


12.9    12/30/2024    

Added git to CBL-Mariner 2.0


13.0    12/31/2024    

Added git to CBL-Mariner 2.0


13.1    01/01/2025    

Added git to CBL-Mariner 2.0


13.2    01/02/2025    

Added git to CBL-Mariner 2.0


13.3    01/03/2025    

Added git to CBL-Mariner 2.0


13.4    01/04/2025    

Added git to CBL-Mariner 2.0


13.5    01/05/2025    

Added git to CBL-Mariner 2.0


13.6    01/06/2025    

Added git to CBL-Mariner 2.0


13.7    01/07/2025    

Added git to CBL-Mariner 2.0


13.8    01/08/2025    

Added git to CBL-Mariner 2.0


13.9    01/09/2025    

Added git to CBL-Mariner 2.0


14.0    01/10/2025    

Added git to CBL-Mariner 2.0


14.1    01/11/2025    

Added git to CBL-Mariner 2.0


14.2    01/12/2025    

Added git to CBL-Mariner 2.0


14.3    01/13/2025    

Added git to CBL-Mariner 2.0


14.4    01/15/2025    

Added git to CBL-Mariner 2.0


14.5    01/16/2025    

Added git to CBL-Mariner 2.0


14.6    01/17/2025    

Added git to CBL-Mariner 2.0


14.7    01/18/2025    

Added git to CBL-Mariner 2.0


14.8    01/19/2025    

Added git to CBL-Mariner 2.0


14.9    01/20/2025    

Added git to CBL-Mariner 2.0


15.0    01/21/2025    

Added git to CBL-Mariner 2.0


15.1    01/22/2025    

Added git to CBL-Mariner 2.0


15.2    01/23/2025    

Added git to CBL-Mariner 2.0


15.3    01/24/2025    

Added git to CBL-Mariner 2.0


15.4    01/25/2025    

Added git to CBL-Mariner 2.0


15.5    01/27/2025    

Added git to CBL-Mariner 2.0


15.6    01/28/2025    

Added git to CBL-Mariner 2.0


15.7    01/29/2025    

Added git to CBL-Mariner 2.0


15.8    01/30/2025    

Added git to CBL-Mariner 2.0


15.9    02/01/2025    

Added git to CBL-Mariner 2.0


16.0    02/02/2025    

Added git to CBL-Mariner 2.0


16.1    02/03/2025    

Added git to CBL-Mariner 2.0


16.2    02/04/2025    

Added git to CBL-Mariner 2.0


16.3    02/05/2025    

Added git to CBL-Mariner 2.0


16.4    02/07/2025    

Added git to CBL-Mariner 2.0


16.5    02/08/2025    

Added git to CBL-Mariner 2.0


16.6    02/09/2025    

Added git to CBL-Mariner 2.0


16.7    02/10/2025    

Added git to CBL-Mariner 2.0


16.8    02/11/2025    

Added git to CBL-Mariner 2.0


16.9    02/12/2025    

Added git to CBL-Mariner 2.0


17.0    02/13/2025    

Added git to CBL-Mariner 2.0


17.1    02/14/2025    

Added git to CBL-Mariner 2.0


17.2    02/15/2025    

Added git to CBL-Mariner 2.0


17.3    02/16/2025    

Added git to CBL-Mariner 2.0


17.4    02/17/2025    

Added git to CBL-Mariner 2.0


17.5    02/18/2025    

Added git to CBL-Mariner 2.0


17.6    02/19/2025    

Added git to CBL-Mariner 2.0


17.7    02/20/2025    

Added git to CBL-Mariner 2.0


17.8    02/21/2025    

Added git to CBL-Mariner 2.0


17.9    02/22/2025    

Added git to CBL-Mariner 2.0


18.0    02/23/2025    

Added git to CBL-Mariner 2.0


18.1    02/24/2025    

Added git to CBL-Mariner 2.0


18.2    02/25/2025    

Added git to CBL-Mariner 2.0


18.3    02/26/2025    

Added git to CBL-Mariner 2.0


18.4    02/27/2025    

Added git to CBL-Mariner 2.0


18.5    02/28/2025    

Added git to CBL-Mariner 2.0


18.6    03/01/2025    

Added git to CBL-Mariner 2.0


18.7    03/02/2025    

Added git to CBL-Mariner 2.0


18.8    03/03/2025    

Added git to CBL-Mariner 2.0


18.9    03/04/2025    

Added git to CBL-Mariner 2.0


19.0    03/05/2025    

Added git to CBL-Mariner 2.0


19.1    03/06/2025    

Added git to CBL-Mariner 2.0


19.2    03/08/2025    

Added git to CBL-Mariner 2.0


19.3    03/09/2025    

Added git to CBL-Mariner 2.0


19.4    03/10/2025    

Added git to CBL-Mariner 2.0


19.5    03/11/2025    

Added git to CBL-Mariner 2.0


19.6    03/12/2025    

Added git to CBL-Mariner 2.0


19.7    03/13/2025    

Added git to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32465
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM git (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.39.4-1
Unknown None
CBL Mariner 2.0 x64 git (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.39.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32465 None

CVE-2021-20286 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-20286
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:2.7/TemporalScore:2.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    01/19/2022    

Information published.


1.1    08/29/2024    

Information published.


1.2    08/30/2024    

Information published.


1.3    08/31/2024    

Information published.


1.4    09/01/2024    

Information published.


1.5    09/02/2024    

Information published.


1.6    09/03/2024    

Information published.


1.7    09/05/2024    

Information published.


1.8    09/06/2024    

Information published.


1.9    09/07/2024    

Information published.


2.0    09/08/2024    

Information published.


2.1    09/11/2024    

Information published.


2.2    09/12/2024    

Information published.


2.3    09/13/2024    

Information published.


2.4    09/14/2024    

Information published.


2.5    09/15/2024    

Information published.


2.6    09/16/2024    

Information published.


2.7    09/17/2024    

Information published.


2.8    09/18/2024    

Information published.


2.9    09/19/2024    

Information published.


3.0    09/20/2024    

Information published.


3.1    09/21/2024    

Information published.


3.2    09/22/2024    

Information published.


3.3    09/23/2024    

Information published.


3.4    09/24/2024    

Information published.


3.5    09/25/2024    

Information published.


3.6    09/26/2024    

Information published.


3.7    09/27/2024    

Information published.


3.8    09/28/2024    

Information published.


3.9    09/29/2024    

Information published.


4.0    09/30/2024    

Information published.


4.1    10/01/2024    

Information published.


4.2    10/02/2024    

Information published.


4.3    10/03/2024    

Information published.


4.4    10/04/2024    

Information published.


4.5    10/05/2024    

Information published.


4.6    10/06/2024    

Information published.


4.7    10/07/2024    

Information published.


4.8    10/09/2024    

Information published.


4.9    10/10/2024    

Information published.


5.0    10/11/2024    

Information published.


5.1    10/12/2024    

Information published.


5.2    10/13/2024    

Information published.


5.3    10/14/2024    

Information published.


5.4    10/15/2024    

Added libnbd to CBL-Mariner 2.0


5.5    10/16/2024    

Added libnbd to CBL-Mariner 2.0


5.6    10/17/2024    

Added libnbd to CBL-Mariner 2.0


5.7    10/18/2024    

Added libnbd to CBL-Mariner 2.0


5.8    10/19/2024    

Added libnbd to CBL-Mariner 2.0


5.9    10/20/2024    

Added libnbd to CBL-Mariner 2.0


6.0    10/21/2024    

Added libnbd to CBL-Mariner 2.0


6.1    10/22/2024    

Added libnbd to CBL-Mariner 2.0


6.2    10/23/2024    

Added libnbd to CBL-Mariner 2.0


6.3    10/24/2024    

Added libnbd to CBL-Mariner 2.0


6.4    10/25/2024    

Added libnbd to CBL-Mariner 2.0


6.5    10/26/2024    

Added libnbd to CBL-Mariner 2.0


6.6    10/27/2024    

Added libnbd to CBL-Mariner 2.0


6.7    10/28/2024    

Added libnbd to CBL-Mariner 2.0


6.8    10/29/2024    

Added libnbd to CBL-Mariner 2.0


6.9    10/30/2024    

Added libnbd to CBL-Mariner 2.0


7.0    10/31/2024    

Added libnbd to CBL-Mariner 2.0


7.1    11/01/2024    

Added libnbd to CBL-Mariner 2.0


7.2    11/02/2024    

Added libnbd to CBL-Mariner 2.0


7.3    11/04/2024    

Added libnbd to CBL-Mariner 2.0


7.4    11/05/2024    

Added libnbd to CBL-Mariner 2.0


7.5    11/06/2024    

Added libnbd to CBL-Mariner 2.0


7.6    11/07/2024    

Added libnbd to CBL-Mariner 2.0


7.7    11/08/2024    

Added libnbd to CBL-Mariner 2.0


7.8    11/09/2024    

Added libnbd to CBL-Mariner 2.0


7.9    11/10/2024    

Added libnbd to CBL-Mariner 2.0


8.0    11/11/2024    

Added libnbd to CBL-Mariner 2.0


8.1    11/12/2024    

Added libnbd to CBL-Mariner 2.0


8.2    11/13/2024    

Added libnbd to CBL-Mariner 2.0


8.3    11/14/2024    

Added libnbd to CBL-Mariner 2.0


8.4    11/15/2024    

Added libnbd to CBL-Mariner 2.0


8.5    11/16/2024    

Added libnbd to CBL-Mariner 2.0


8.6    11/17/2024    

Added libnbd to CBL-Mariner 2.0


8.7    11/18/2024    

Added libnbd to CBL-Mariner 2.0


8.8    11/19/2024    

Added libnbd to CBL-Mariner 2.0


8.9    11/20/2024    

Added libnbd to CBL-Mariner 2.0


9.0    11/21/2024    

Added libnbd to CBL-Mariner 2.0


9.1    11/23/2024    

Added libnbd to CBL-Mariner 2.0


9.2    11/24/2024    

Added libnbd to CBL-Mariner 2.0


9.3    11/25/2024    

Added libnbd to CBL-Mariner 2.0


9.4    11/26/2024    

Added libnbd to CBL-Mariner 2.0


9.5    11/27/2024    

Added libnbd to CBL-Mariner 2.0


9.6    11/28/2024    

Added libnbd to CBL-Mariner 2.0


9.7    11/29/2024    

Added libnbd to CBL-Mariner 2.0


9.8    11/30/2024    

Added libnbd to CBL-Mariner 2.0


9.9    12/01/2024    

Added libnbd to CBL-Mariner 2.0


10.0    12/02/2024    

Added libnbd to CBL-Mariner 2.0


10.1    12/03/2024    

Added libnbd to CBL-Mariner 2.0


10.2    12/04/2024    

Added libnbd to CBL-Mariner 2.0


10.3    12/05/2024    

Added libnbd to CBL-Mariner 2.0


10.4    12/07/2024    

Added libnbd to CBL-Mariner 2.0


10.5    12/08/2024    

Added libnbd to CBL-Mariner 2.0


10.6    12/09/2024    

Added libnbd to CBL-Mariner 2.0


10.7    12/10/2024    

Added libnbd to CBL-Mariner 2.0


10.8    12/11/2024    

Added libnbd to CBL-Mariner 2.0


10.9    12/12/2024    

Added libnbd to CBL-Mariner 2.0


11.0    12/13/2024    

Added libnbd to CBL-Mariner 2.0


11.1    12/14/2024    

Added libnbd to CBL-Mariner 2.0


11.2    12/15/2024    

Added libnbd to CBL-Mariner 2.0


11.3    12/16/2024    

Added libnbd to CBL-Mariner 2.0


11.4    12/17/2024    

Added libnbd to CBL-Mariner 2.0


11.5    12/18/2024    

Added libnbd to CBL-Mariner 2.0


11.6    12/19/2024    

Added libnbd to CBL-Mariner 2.0


11.7    12/20/2024    

Added libnbd to CBL-Mariner 2.0


11.8    12/21/2024    

Added libnbd to CBL-Mariner 2.0


11.9    12/22/2024    

Added libnbd to CBL-Mariner 2.0


12.0    12/23/2024    

Added libnbd to CBL-Mariner 2.0


12.1    12/24/2024    

Added libnbd to CBL-Mariner 2.0


12.2    12/25/2024    

Added libnbd to CBL-Mariner 2.0


12.3    12/26/2024    

Added libnbd to CBL-Mariner 2.0


12.4    12/27/2024    

Added libnbd to CBL-Mariner 2.0


12.5    12/28/2024    

Added libnbd to CBL-Mariner 2.0


12.6    12/29/2024    

Added libnbd to CBL-Mariner 2.0


12.7    12/30/2024    

Added libnbd to CBL-Mariner 2.0


12.8    12/31/2024    

Added libnbd to CBL-Mariner 2.0


12.9    01/01/2025    

Added libnbd to CBL-Mariner 2.0


13.0    01/02/2025    

Added libnbd to CBL-Mariner 2.0


13.1    01/03/2025    

Added libnbd to CBL-Mariner 2.0


13.2    01/04/2025    

Added libnbd to CBL-Mariner 2.0


13.3    01/05/2025    

Added libnbd to CBL-Mariner 2.0


13.4    01/06/2025    

Added libnbd to CBL-Mariner 2.0


13.5    01/07/2025    

Added libnbd to CBL-Mariner 2.0


13.6    01/08/2025    

Added libnbd to CBL-Mariner 2.0


13.7    01/09/2025    

Added libnbd to CBL-Mariner 2.0


13.8    01/10/2025    

Added libnbd to CBL-Mariner 2.0


13.9    01/11/2025    

Added libnbd to CBL-Mariner 2.0


14.0    01/12/2025    

Added libnbd to CBL-Mariner 2.0


14.1    01/13/2025    

Added libnbd to CBL-Mariner 2.0


14.2    01/15/2025    

Added libnbd to CBL-Mariner 2.0


14.3    01/16/2025    

Added libnbd to CBL-Mariner 2.0


14.4    01/17/2025    

Added libnbd to CBL-Mariner 2.0


14.5    01/18/2025    

Added libnbd to CBL-Mariner 2.0


14.6    01/19/2025    

Added libnbd to CBL-Mariner 2.0


14.7    01/20/2025    

Added libnbd to CBL-Mariner 2.0


14.8    01/21/2025    

Added libnbd to CBL-Mariner 2.0


14.9    01/22/2025    

Added libnbd to CBL-Mariner 2.0


15.0    01/23/2025    

Added libnbd to CBL-Mariner 2.0


15.1    01/24/2025    

Added libnbd to CBL-Mariner 2.0


15.2    01/25/2025    

Added libnbd to CBL-Mariner 2.0


15.3    01/27/2025    

Added libnbd to CBL-Mariner 2.0


15.4    01/28/2025    

Added libnbd to CBL-Mariner 2.0


15.5    01/29/2025    

Added libnbd to CBL-Mariner 2.0


15.6    01/30/2025    

Added libnbd to CBL-Mariner 2.0


15.7    02/01/2025    

Added libnbd to CBL-Mariner 2.0


15.8    02/02/2025    

Added libnbd to CBL-Mariner 2.0


15.9    02/03/2025    

Added libnbd to CBL-Mariner 2.0


16.0    02/04/2025    

Added libnbd to CBL-Mariner 2.0


16.1    02/05/2025    

Added libnbd to CBL-Mariner 2.0


16.2    02/07/2025    

Added libnbd to CBL-Mariner 2.0


16.3    02/08/2025    

Added libnbd to CBL-Mariner 2.0


16.4    02/09/2025    

Added libnbd to CBL-Mariner 2.0


16.5    02/10/2025    

Added libnbd to CBL-Mariner 2.0


16.6    02/11/2025    

Added libnbd to CBL-Mariner 2.0


16.7    02/12/2025    

Added libnbd to CBL-Mariner 2.0


16.8    02/13/2025    

Added libnbd to CBL-Mariner 2.0


16.9    02/14/2025    

Added libnbd to CBL-Mariner 2.0


17.0    02/15/2025    

Added libnbd to CBL-Mariner 2.0


17.1    02/16/2025    

Added libnbd to CBL-Mariner 2.0


17.2    02/17/2025    

Added libnbd to CBL-Mariner 2.0


17.3    02/18/2025    

Added libnbd to CBL-Mariner 2.0


17.4    02/19/2025    

Added libnbd to CBL-Mariner 2.0


17.5    02/20/2025    

Added libnbd to CBL-Mariner 2.0


17.6    02/21/2025    

Added libnbd to CBL-Mariner 2.0


17.7    02/22/2025    

Added libnbd to CBL-Mariner 2.0


17.8    02/23/2025    

Added libnbd to CBL-Mariner 2.0


17.9    02/24/2025    

Added libnbd to CBL-Mariner 2.0


18.0    02/25/2025    

Added libnbd to CBL-Mariner 2.0


18.1    02/26/2025    

Added libnbd to CBL-Mariner 2.0


18.2    02/27/2025    

Added libnbd to CBL-Mariner 2.0


18.3    02/28/2025    

Added libnbd to CBL-Mariner 2.0


18.4    03/01/2025    

Added libnbd to CBL-Mariner 2.0


18.5    03/02/2025    

Added libnbd to CBL-Mariner 2.0


18.6    03/03/2025    

Added libnbd to CBL-Mariner 2.0


18.7    03/04/2025    

Added libnbd to CBL-Mariner 2.0


18.8    03/05/2025    

Added libnbd to CBL-Mariner 2.0


18.9    03/06/2025    

Added libnbd to CBL-Mariner 2.0


19.0    03/08/2025    

Added libnbd to CBL-Mariner 2.0


19.1    03/09/2025    

Added libnbd to CBL-Mariner 2.0


19.2    03/10/2025    

Added libnbd to CBL-Mariner 2.0


19.3    03/11/2025    

Added libnbd to CBL-Mariner 2.0


19.4    03/12/2025    

Added libnbd to CBL-Mariner 2.0


19.5    03/14/2025    

Added libnbd to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-20286
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
Unknown Unknown None
CBL Mariner 2.0 ARM libnbd (CBL-Mariner) Unknown Unknown Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1.12.1-1
Unknown None
CBL Mariner 2.0 x64 libnbd (CBL-Mariner) Unknown Unknown Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1.12.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-20286 None

CVE-2024-32021 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32021
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.9/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05/17/2024    

Information published.


1.1    06/30/2024    

Information published.


1.2    08/29/2024    

Information published.


1.3    08/30/2024    

Information published.


1.4    08/31/2024    

Information published.


1.5    09/01/2024    

Information published.


1.6    09/02/2024    

Information published.


1.7    09/03/2024    

Information published.


1.8    09/05/2024    

Information published.


1.9    09/06/2024    

Information published.


2.0    09/07/2024    

Information published.


2.1    09/08/2024    

Information published.


2.2    09/11/2024    

Information published.


2.3    09/12/2024    

Information published.


2.4    09/13/2024    

Information published.


2.5    09/14/2024    

Information published.


2.6    09/15/2024    

Information published.


2.7    09/16/2024    

Information published.


2.8    09/17/2024    

Information published.


2.9    09/18/2024    

Information published.


3.0    09/19/2024    

Information published.


3.1    09/20/2024    

Information published.


3.2    09/21/2024    

Information published.


3.3    09/22/2024    

Information published.


3.4    09/23/2024    

Information published.


3.5    09/24/2024    

Information published.


3.6    09/25/2024    

Information published.


3.7    09/26/2024    

Information published.


3.8    09/27/2024    

Information published.


3.9    09/28/2024    

Information published.


4.0    09/29/2024    

Information published.


4.1    09/30/2024    

Information published.


4.2    10/01/2024    

Information published.


4.3    10/02/2024    

Information published.


4.4    10/03/2024    

Information published.


4.5    10/04/2024    

Information published.


4.6    10/05/2024    

Information published.


4.7    10/06/2024    

Information published.


4.8    10/07/2024    

Information published.


4.9    10/08/2024    

Information published.


5.0    10/09/2024    

Information published.


5.1    10/10/2024    

Information published.


5.2    10/11/2024    

Information published.


5.3    10/12/2024    

Information published.


5.4    10/13/2024    

Information published.


5.5    10/14/2024    

Information published.


5.6    10/15/2024    

Added git to CBL-Mariner 2.0


5.7    10/16/2024    

Added git to CBL-Mariner 2.0


5.8    10/17/2024    

Added git to CBL-Mariner 2.0


5.9    10/18/2024    

Added git to CBL-Mariner 2.0


6.0    10/19/2024    

Added git to CBL-Mariner 2.0


6.1    10/20/2024    

Added git to CBL-Mariner 2.0


6.2    10/21/2024    

Added git to CBL-Mariner 2.0


6.3    10/22/2024    

Added git to CBL-Mariner 2.0


6.4    10/23/2024    

Added git to CBL-Mariner 2.0


6.5    10/24/2024    

Added git to CBL-Mariner 2.0


6.6    10/25/2024    

Added git to CBL-Mariner 2.0


6.7    10/26/2024    

Added git to CBL-Mariner 2.0


6.8    10/27/2024    

Added git to CBL-Mariner 2.0


6.9    10/28/2024    

Added git to CBL-Mariner 2.0


7.0    10/29/2024    

Added git to CBL-Mariner 2.0


7.1    10/30/2024    

Added git to CBL-Mariner 2.0


7.2    10/31/2024    

Added git to CBL-Mariner 2.0


7.3    11/01/2024    

Added git to CBL-Mariner 2.0


7.4    11/02/2024    

Added git to CBL-Mariner 2.0


7.5    11/04/2024    

Added git to CBL-Mariner 2.0


7.6    11/05/2024    

Added git to CBL-Mariner 2.0


7.7    11/06/2024    

Added git to CBL-Mariner 2.0


7.8    11/07/2024    

Added git to CBL-Mariner 2.0


7.9    11/08/2024    

Added git to CBL-Mariner 2.0


8.0    11/09/2024    

Added git to CBL-Mariner 2.0


8.1    11/10/2024    

Added git to CBL-Mariner 2.0


8.2    11/11/2024    

Added git to CBL-Mariner 2.0


8.3    11/12/2024    

Added git to CBL-Mariner 2.0


8.4    11/13/2024    

Added git to CBL-Mariner 2.0


8.5    11/14/2024    

Added git to CBL-Mariner 2.0


8.6    11/15/2024    

Added git to CBL-Mariner 2.0


8.7    11/16/2024    

Added git to CBL-Mariner 2.0


8.8    11/17/2024    

Added git to CBL-Mariner 2.0


8.9    11/18/2024    

Added git to CBL-Mariner 2.0


9.0    11/19/2024    

Added git to CBL-Mariner 2.0


9.1    11/20/2024    

Added git to CBL-Mariner 2.0


9.2    11/21/2024    

Added git to CBL-Mariner 2.0


9.3    11/23/2024    

Added git to CBL-Mariner 2.0


9.4    11/24/2024    

Added git to CBL-Mariner 2.0


9.5    11/25/2024    

Added git to CBL-Mariner 2.0


9.6    11/26/2024    

Added git to CBL-Mariner 2.0


9.7    11/27/2024    

Added git to CBL-Mariner 2.0


9.8    11/28/2024    

Added git to CBL-Mariner 2.0


9.9    11/29/2024    

Added git to CBL-Mariner 2.0


10.0    11/30/2024    

Added git to CBL-Mariner 2.0


10.1    12/01/2024    

Added git to CBL-Mariner 2.0


10.2    12/02/2024    

Added git to CBL-Mariner 2.0


10.3    12/03/2024    

Added git to CBL-Mariner 2.0


10.4    12/04/2024    

Added git to CBL-Mariner 2.0


10.5    12/05/2024    

Added git to CBL-Mariner 2.0


10.6    12/07/2024    

Added git to CBL-Mariner 2.0


10.7    12/08/2024    

Added git to CBL-Mariner 2.0


10.8    12/09/2024    

Added git to CBL-Mariner 2.0


10.9    12/10/2024    

Added git to CBL-Mariner 2.0


11.0    12/11/2024    

Added git to CBL-Mariner 2.0


11.1    12/12/2024    

Added git to CBL-Mariner 2.0


11.2    12/13/2024    

Added git to CBL-Mariner 2.0


11.3    12/14/2024    

Added git to CBL-Mariner 2.0


11.4    12/15/2024    

Added git to CBL-Mariner 2.0


11.5    12/16/2024    

Added git to CBL-Mariner 2.0


11.6    12/17/2024    

Added git to CBL-Mariner 2.0


11.7    12/18/2024    

Added git to CBL-Mariner 2.0


11.8    12/19/2024    

Added git to CBL-Mariner 2.0


11.9    12/20/2024    

Added git to CBL-Mariner 2.0


12.0    12/21/2024    

Added git to CBL-Mariner 2.0


12.1    12/22/2024    

Added git to CBL-Mariner 2.0


12.2    12/23/2024    

Added git to CBL-Mariner 2.0


12.3    12/24/2024    

Added git to CBL-Mariner 2.0


12.4    12/25/2024    

Added git to CBL-Mariner 2.0


12.5    12/26/2024    

Added git to CBL-Mariner 2.0


12.6    12/27/2024    

Added git to CBL-Mariner 2.0


12.7    12/28/2024    

Added git to CBL-Mariner 2.0


12.8    12/29/2024    

Added git to CBL-Mariner 2.0


12.9    12/30/2024    

Added git to CBL-Mariner 2.0


13.0    12/31/2024    

Added git to CBL-Mariner 2.0


13.1    01/01/2025    

Added git to CBL-Mariner 2.0


13.2    01/02/2025    

Added git to CBL-Mariner 2.0


13.3    01/03/2025    

Added git to CBL-Mariner 2.0


13.4    01/04/2025    

Added git to CBL-Mariner 2.0


13.5    01/05/2025    

Added git to CBL-Mariner 2.0


13.6    01/06/2025    

Added git to CBL-Mariner 2.0


13.7    01/07/2025    

Added git to CBL-Mariner 2.0


13.8    01/08/2025    

Added git to CBL-Mariner 2.0


13.9    01/09/2025    

Added git to CBL-Mariner 2.0


14.0    01/10/2025    

Added git to CBL-Mariner 2.0


14.1    01/11/2025    

Added git to CBL-Mariner 2.0


14.2    01/12/2025    

Added git to CBL-Mariner 2.0


14.3    01/13/2025    

Added git to CBL-Mariner 2.0


14.4    01/15/2025    

Added git to CBL-Mariner 2.0


14.5    01/16/2025    

Added git to CBL-Mariner 2.0


14.6    01/17/2025    

Added git to CBL-Mariner 2.0


14.7    01/18/2025    

Added git to CBL-Mariner 2.0


14.8    01/19/2025    

Added git to CBL-Mariner 2.0


14.9    01/20/2025    

Added git to CBL-Mariner 2.0


15.0    01/21/2025    

Added git to CBL-Mariner 2.0


15.1    01/22/2025    

Added git to CBL-Mariner 2.0


15.2    01/23/2025    

Added git to CBL-Mariner 2.0


15.3    01/24/2025    

Added git to CBL-Mariner 2.0


15.4    01/25/2025    

Added git to CBL-Mariner 2.0


15.5    01/27/2025    

Added git to CBL-Mariner 2.0


15.6    01/28/2025    

Added git to CBL-Mariner 2.0


15.7    01/29/2025    

Added git to CBL-Mariner 2.0


15.8    01/30/2025    

Added git to CBL-Mariner 2.0


15.9    02/01/2025    

Added git to CBL-Mariner 2.0


16.0    02/02/2025    

Added git to CBL-Mariner 2.0


16.1    02/03/2025    

Added git to CBL-Mariner 2.0


16.2    02/04/2025    

Added git to CBL-Mariner 2.0


16.3    02/05/2025    

Added git to CBL-Mariner 2.0


16.4    02/07/2025    

Added git to CBL-Mariner 2.0


16.5    02/08/2025    

Added git to CBL-Mariner 2.0


16.6    02/09/2025    

Added git to CBL-Mariner 2.0


16.7    02/10/2025    

Added git to CBL-Mariner 2.0


16.8    02/11/2025    

Added git to CBL-Mariner 2.0


16.9    02/12/2025    

Added git to CBL-Mariner 2.0


17.0    02/13/2025    

Added git to CBL-Mariner 2.0


17.1    02/14/2025    

Added git to CBL-Mariner 2.0


17.2    02/15/2025    

Added git to CBL-Mariner 2.0


17.3    02/16/2025    

Added git to CBL-Mariner 2.0


17.4    02/17/2025    

Added git to CBL-Mariner 2.0


17.5    02/18/2025    

Added git to CBL-Mariner 2.0


17.6    02/19/2025    

Added git to CBL-Mariner 2.0


17.7    02/20/2025    

Added git to CBL-Mariner 2.0


17.8    02/21/2025    

Added git to CBL-Mariner 2.0


17.9    02/22/2025    

Added git to CBL-Mariner 2.0


18.0    02/23/2025    

Added git to CBL-Mariner 2.0


18.1    02/24/2025    

Added git to CBL-Mariner 2.0


18.2    02/25/2025    

Added git to CBL-Mariner 2.0


18.3    02/26/2025    

Added git to CBL-Mariner 2.0


18.4    02/27/2025    

Added git to CBL-Mariner 2.0


18.5    02/28/2025    

Added git to CBL-Mariner 2.0


18.6    03/01/2025    

Added git to CBL-Mariner 2.0


18.7    03/02/2025    

Added git to CBL-Mariner 2.0


18.8    03/03/2025    

Added git to CBL-Mariner 2.0


18.9    03/04/2025    

Added git to CBL-Mariner 2.0


19.0    03/05/2025    

Added git to CBL-Mariner 2.0


19.1    03/06/2025    

Added git to CBL-Mariner 2.0


19.2    03/08/2025    

Added git to CBL-Mariner 2.0


19.3    03/09/2025    

Added git to CBL-Mariner 2.0


19.4    03/10/2025    

Added git to CBL-Mariner 2.0


19.5    03/11/2025    

Added git to CBL-Mariner 2.0


19.6    03/12/2025    

Added git to CBL-Mariner 2.0


19.7    03/13/2025    

Added git to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32021
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Unknown Unknown None
CBL Mariner 2.0 ARM git (CBL-Mariner) Unknown Unknown Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
2.39.4-1
Unknown None
CBL Mariner 2.0 x64 git (CBL-Mariner) Unknown Unknown Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
2.39.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32021 None

CVE-2023-40549 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40549
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    12/07/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.2    12/08/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.3    12/09/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.4    12/10/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.5    12/11/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.6    12/12/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.7    12/13/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.8    12/14/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.9    12/15/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.0    12/16/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.1    12/17/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.2    12/18/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.3    12/19/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.4    12/20/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.5    12/21/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.6    12/22/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.7    12/23/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.8    12/24/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.9    12/25/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    12/26/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.1    12/27/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.2    12/28/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.3    12/29/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.4    12/30/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.5    12/31/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.6    01/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.7    01/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.8    01/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.9    01/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    01/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.1    01/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.2    01/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.3    01/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.4    01/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.5    01/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.6    01/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.7    01/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.8    01/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.9    01/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    01/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.1    01/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.2    01/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.3    01/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.4    01/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.5    01/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.6    01/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.7    01/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.8    01/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.9    01/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.0    01/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.1    01/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.2    01/29/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.3    01/30/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.4    02/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.5    02/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.6    02/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.7    02/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.8    02/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.9    02/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.0    02/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.1    02/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.2    02/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.3    02/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.4    02/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.5    02/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.6    02/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.7    02/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.8    02/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.9    02/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.0    02/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.1    02/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.2    02/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.3    02/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.4    02/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.5    02/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.6    02/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.7    02/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.8    02/26/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.9    02/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.0    02/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.1    03/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.2    03/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.3    03/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.4    03/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.5    03/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.6    03/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.7    03/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.8    03/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.9    03/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.0    03/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.1    03/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.2    03/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40549
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-5
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-5
None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1
None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40549 None

CVE-2023-40546 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40546
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    12/07/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.2    12/08/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.3    12/09/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.4    12/10/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.5    12/11/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.6    12/12/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.7    12/13/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.8    12/14/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.9    12/15/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.0    12/16/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.1    12/17/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.2    12/18/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.3    12/19/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.4    12/20/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.5    12/21/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.6    12/22/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.7    12/23/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.8    12/24/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.9    12/25/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    12/26/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.1    12/27/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.2    12/28/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.3    12/29/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.4    12/30/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.5    12/31/2024    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.6    01/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.7    01/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.8    01/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.9    01/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    01/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.1    01/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.2    01/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.3    01/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.4    01/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.5    01/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.6    01/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.7    01/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.8    01/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.9    01/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    01/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.1    01/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.2    01/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.3    01/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.4    01/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.5    01/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.6    01/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.7    01/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.8    01/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.9    01/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.0    01/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.1    01/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.2    01/29/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.3    01/30/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.4    02/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.5    02/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.6    02/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.7    02/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.8    02/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.9    02/07/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.0    02/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.1    02/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.2    02/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.3    02/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.4    02/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.5    02/13/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.6    02/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.7    02/15/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.8    02/16/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.9    02/17/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.0    02/18/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.1    02/19/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.2    02/20/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.3    02/21/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.4    02/22/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.5    02/23/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.6    02/24/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.7    02/25/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.8    02/26/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.9    02/27/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.0    02/28/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.1    03/01/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.2    03/02/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.3    03/03/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.4    03/04/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.5    03/05/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.6    03/06/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.7    03/08/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.8    03/09/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.9    03/10/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.0    03/11/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.1    03/12/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


10.2    03/14/2025    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40546
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-5
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-5
None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1
None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40546 None

CVE-2024-37535 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-37535
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06/30/2024    

Information published.


1.1    07/12/2024    

Information published.


1.2    09/20/2024    

Information published.


1.3    09/21/2024    

Information published.


1.4    09/22/2024    

Information published.


1.5    09/23/2024    

Information published.


1.6    09/24/2024    

Information published.


1.7    09/25/2024    

Information published.


1.8    09/26/2024    

Information published.


1.9    09/27/2024    

Information published.


2.0    09/28/2024    

Information published.


2.1    09/29/2024    

Information published.


2.2    09/30/2024    

Information published.


2.3    10/01/2024    

Information published.


2.4    10/02/2024    

Information published.


2.5    10/03/2024    

Information published.


2.6    10/04/2024    

Information published.


2.7    10/05/2024    

Information published.


2.8    10/06/2024    

Information published.


2.9    10/07/2024    

Information published.


3.0    10/08/2024    

Information published.


3.1    10/09/2024    

Information published.


3.2    10/10/2024    

Information published.


3.3    10/11/2024    

Information published.


3.4    10/12/2024    

Information published.


3.5    10/13/2024    

Information published.


3.6    10/14/2024    

Information published.


3.7    10/15/2024    

Added vte291 to CBL-Mariner 2.0


3.8    10/16/2024    

Added vte291 to CBL-Mariner 2.0


3.9    10/17/2024    

Added vte291 to CBL-Mariner 2.0


4.0    10/18/2024    

Added vte291 to CBL-Mariner 2.0


4.1    10/19/2024    

Added vte291 to CBL-Mariner 2.0


4.2    10/20/2024    

Added vte291 to CBL-Mariner 2.0


4.3    10/21/2024    

Added vte291 to CBL-Mariner 2.0


4.4    10/22/2024    

Added vte291 to CBL-Mariner 2.0


4.5    10/23/2024    

Added vte291 to CBL-Mariner 2.0


4.6    10/24/2024    

Added vte291 to CBL-Mariner 2.0


4.7    10/25/2024    

Added vte291 to CBL-Mariner 2.0


4.8    10/26/2024    

Added vte291 to CBL-Mariner 2.0


4.9    10/27/2024    

Added vte291 to CBL-Mariner 2.0


5.0    10/28/2024    

Added vte291 to CBL-Mariner 2.0


5.1    10/29/2024    

Added vte291 to CBL-Mariner 2.0


5.2    10/30/2024    

Added vte291 to CBL-Mariner 2.0


5.3    10/31/2024    

Added vte291 to CBL-Mariner 2.0


5.4    11/01/2024    

Added vte291 to CBL-Mariner 2.0


5.5    11/02/2024    

Added vte291 to CBL-Mariner 2.0


5.6    11/04/2024    

Added vte291 to CBL-Mariner 2.0


5.7    11/05/2024    

Added vte291 to CBL-Mariner 2.0


5.8    11/06/2024    

Added vte291 to CBL-Mariner 2.0


5.9    11/07/2024    

Added vte291 to CBL-Mariner 2.0


6.0    11/08/2024    

Added vte291 to CBL-Mariner 2.0


6.1    11/09/2024    

Added vte291 to CBL-Mariner 2.0


6.2    11/10/2024    

Added vte291 to CBL-Mariner 2.0


6.3    11/11/2024    

Added vte291 to CBL-Mariner 2.0


6.4    11/12/2024    

Added vte291 to CBL-Mariner 2.0


6.5    11/13/2024    

Added vte291 to CBL-Mariner 2.0


6.6    11/14/2024    

Added vte291 to CBL-Mariner 2.0


6.7    11/15/2024    

Added vte291 to CBL-Mariner 2.0


6.8    11/16/2024    

Added vte291 to CBL-Mariner 2.0


6.9    11/17/2024    

Added vte291 to CBL-Mariner 2.0


7.0    11/18/2024    

Added vte291 to CBL-Mariner 2.0


7.1    11/19/2024    

Added vte291 to CBL-Mariner 2.0


7.2    11/20/2024    

Added vte291 to CBL-Mariner 2.0


7.3    11/21/2024    

Added vte291 to CBL-Mariner 2.0


7.4    11/23/2024    

Added vte291 to CBL-Mariner 2.0


7.5    11/24/2024    

Added vte291 to CBL-Mariner 2.0


7.6    11/25/2024    

Added vte291 to CBL-Mariner 2.0


7.7    11/26/2024    

Added vte291 to CBL-Mariner 2.0


7.8    11/27/2024    

Added vte291 to CBL-Mariner 2.0


7.9    11/28/2024    

Added vte291 to CBL-Mariner 2.0


8.0    11/29/2024    

Added vte291 to CBL-Mariner 2.0


8.1    11/30/2024    

Added vte291 to CBL-Mariner 2.0


8.2    12/01/2024    

Added vte291 to CBL-Mariner 2.0


8.3    12/02/2024    

Added vte291 to CBL-Mariner 2.0


8.4    12/03/2024    

Added vte291 to CBL-Mariner 2.0


8.5    12/04/2024    

Added vte291 to CBL-Mariner 2.0


8.6    12/05/2024    

Added vte291 to CBL-Mariner 2.0


8.7    12/07/2024    

Added vte291 to CBL-Mariner 2.0


8.8    12/08/2024    

Added vte291 to CBL-Mariner 2.0


8.9    12/09/2024    

Added vte291 to CBL-Mariner 2.0


9.0    12/10/2024    

Added vte291 to CBL-Mariner 2.0


9.1    12/11/2024    

Added vte291 to CBL-Mariner 2.0


9.2    12/12/2024    

Added vte291 to CBL-Mariner 2.0


9.3    12/13/2024    

Added vte291 to CBL-Mariner 2.0


9.4    12/14/2024    

Added vte291 to CBL-Mariner 2.0


9.5    12/15/2024    

Added vte291 to CBL-Mariner 2.0


9.6    12/16/2024    

Added vte291 to CBL-Mariner 2.0


9.7    12/17/2024    

Added vte291 to CBL-Mariner 2.0


9.8    12/18/2024    

Added vte291 to CBL-Mariner 2.0


9.9    12/19/2024    

Added vte291 to CBL-Mariner 2.0


10.0    12/20/2024    

Added vte291 to CBL-Mariner 2.0


10.1    12/21/2024    

Added vte291 to CBL-Mariner 2.0


10.2    12/22/2024    

Added vte291 to CBL-Mariner 2.0


10.3    12/23/2024    

Added vte291 to CBL-Mariner 2.0


10.4    12/24/2024    

Added vte291 to CBL-Mariner 2.0


10.5    12/25/2024    

Added vte291 to CBL-Mariner 2.0


10.6    12/26/2024    

Added vte291 to CBL-Mariner 2.0


10.7    12/27/2024    

Added vte291 to CBL-Mariner 2.0


10.8    12/28/2024    

Added vte291 to CBL-Mariner 2.0


10.9    12/29/2024    

Added vte291 to CBL-Mariner 2.0


11.0    12/30/2024    

Added vte291 to CBL-Mariner 2.0


11.1    12/31/2024    

Added vte291 to CBL-Mariner 2.0


11.2    01/01/2025    

Added vte291 to CBL-Mariner 2.0


11.3    01/02/2025    

Added vte291 to CBL-Mariner 2.0


11.4    01/03/2025    

Added vte291 to CBL-Mariner 2.0


11.5    01/04/2025    

Added vte291 to CBL-Mariner 2.0


11.6    01/05/2025    

Added vte291 to CBL-Mariner 2.0


11.7    01/06/2025    

Added vte291 to CBL-Mariner 2.0


11.8    01/07/2025    

Added vte291 to CBL-Mariner 2.0


11.9    01/08/2025    

Added vte291 to CBL-Mariner 2.0


12.0    01/09/2025    

Added vte291 to CBL-Mariner 2.0


12.1    01/10/2025    

Added vte291 to CBL-Mariner 2.0


12.2    01/11/2025    

Added vte291 to CBL-Mariner 2.0


12.3    01/12/2025    

Added vte291 to CBL-Mariner 2.0


12.4    01/13/2025    

Added vte291 to CBL-Mariner 2.0


12.5    01/15/2025    

Added vte291 to CBL-Mariner 2.0


12.6    01/16/2025    

Added vte291 to CBL-Mariner 2.0


12.7    01/17/2025    

Added vte291 to CBL-Mariner 2.0


12.8    01/18/2025    

Added vte291 to CBL-Mariner 2.0


12.9    01/19/2025    

Added vte291 to CBL-Mariner 2.0


13.0    01/20/2025    

Added vte291 to CBL-Mariner 2.0


13.1    01/21/2025    

Added vte291 to CBL-Mariner 2.0


13.2    01/22/2025    

Added vte291 to CBL-Mariner 2.0


13.3    01/23/2025    

Added vte291 to CBL-Mariner 2.0


13.4    01/24/2025    

Added vte291 to CBL-Mariner 2.0


13.5    01/25/2025    

Added vte291 to CBL-Mariner 2.0


13.6    01/27/2025    

Added vte291 to CBL-Mariner 2.0


13.7    01/28/2025    

Added vte291 to CBL-Mariner 2.0


13.8    01/29/2025    

Added vte291 to CBL-Mariner 2.0


13.9    01/30/2025    

Added vte291 to CBL-Mariner 2.0


14.0    02/01/2025    

Added vte291 to CBL-Mariner 2.0


14.1    02/02/2025    

Added vte291 to CBL-Mariner 2.0


14.2    02/03/2025    

Added vte291 to CBL-Mariner 2.0


14.3    02/04/2025    

Added vte291 to CBL-Mariner 2.0


14.4    02/05/2025    

Added vte291 to CBL-Mariner 2.0


14.5    02/07/2025    

Added vte291 to CBL-Mariner 2.0


14.6    02/08/2025    

Added vte291 to CBL-Mariner 2.0


14.7    02/09/2025    

Added vte291 to CBL-Mariner 2.0


14.8    02/10/2025    

Added vte291 to CBL-Mariner 2.0


14.9    02/11/2025    

Added vte291 to CBL-Mariner 2.0


15.0    02/12/2025    

Added vte291 to CBL-Mariner 2.0


15.1    02/13/2025    

Added vte291 to CBL-Mariner 2.0


15.2    02/14/2025    

Added vte291 to CBL-Mariner 2.0


15.3    02/15/2025    

Added vte291 to CBL-Mariner 2.0


15.4    02/16/2025    

Added vte291 to CBL-Mariner 2.0


15.5    02/17/2025    

Added vte291 to CBL-Mariner 2.0


15.6    02/18/2025    

Added vte291 to CBL-Mariner 2.0


15.7    02/19/2025    

Added vte291 to CBL-Mariner 2.0


15.8    02/20/2025    

Added vte291 to CBL-Mariner 2.0


15.9    02/21/2025    

Added vte291 to CBL-Mariner 2.0


16.0    02/22/2025    

Added vte291 to CBL-Mariner 2.0


16.1    02/23/2025    

Added vte291 to CBL-Mariner 2.0


16.2    02/24/2025    

Added vte291 to CBL-Mariner 2.0


16.3    02/25/2025    

Added vte291 to CBL-Mariner 2.0


16.4    02/26/2025    

Added vte291 to CBL-Mariner 2.0


16.5    02/27/2025    

Added vte291 to CBL-Mariner 2.0


16.6    02/28/2025    

Added vte291 to CBL-Mariner 2.0


16.7    03/01/2025    

Added vte291 to CBL-Mariner 2.0


16.8    03/02/2025    

Added vte291 to CBL-Mariner 2.0


16.9    03/03/2025    

Added vte291 to CBL-Mariner 2.0


17.0    03/04/2025    

Added vte291 to CBL-Mariner 2.0


17.1    03/05/2025    

Added vte291 to CBL-Mariner 2.0


17.2    03/06/2025    

Added vte291 to CBL-Mariner 2.0


17.3    03/08/2025    

Added vte291 to CBL-Mariner 2.0


17.4    03/09/2025    

Added vte291 to CBL-Mariner 2.0


17.5    03/10/2025    

Added vte291 to CBL-Mariner 2.0


17.6    03/11/2025    

Added vte291 to CBL-Mariner 2.0


17.7    03/12/2025    

Added vte291 to CBL-Mariner 2.0


17.8    03/14/2025    

Added vte291 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-37535
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM vte291 (CBL-Mariner) Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
0.66.2-3
Unknown None
CBL Mariner 2.0 x64 vte291 (CBL-Mariner) Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
0.66.2-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-37535 None

CVE-2023-1393 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-1393
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    04/03/2023    

Information published.


1.1    06/30/2024    

Information published.


1.2    09/11/2024    

Information published.


1.3    09/12/2024    

Information published.


1.4    09/13/2024    

Information published.


1.5    09/14/2024    

Information published.


1.6    09/15/2024    

Information published.


1.7    09/16/2024    

Information published.


1.8    09/17/2024    

Information published.


1.9    09/18/2024    

Information published.


2.0    09/19/2024    

Information published.


2.1    09/20/2024    

Information published.


2.2    09/21/2024    

Information published.


2.3    09/22/2024    

Information published.


2.4    09/23/2024    

Information published.


2.5    09/24/2024    

Information published.


2.6    09/25/2024    

Information published.


2.7    09/26/2024    

Information published.


2.8    09/27/2024    

Information published.


2.9    09/28/2024    

Information published.


3.0    09/29/2024    

Information published.


3.1    09/30/2024    

Information published.


3.2    10/01/2024    

Information published.


3.3    10/02/2024    

Information published.


3.4    10/03/2024    

Information published.


3.5    10/04/2024    

Information published.


3.6    10/05/2024    

Information published.


3.7    10/06/2024    

Information published.


3.8    10/07/2024    

Information published.


3.9    10/09/2024    

Information published.


4.0    10/10/2024    

Information published.


4.1    10/11/2024    

Information published.


4.2    10/12/2024    

Information published.


4.3    10/13/2024    

Information published.


4.4    10/14/2024    

Information published.


4.5    10/15/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


4.6    10/16/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


4.7    10/17/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


4.8    10/18/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


4.9    10/19/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.0    10/20/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.1    10/21/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.2    10/22/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.3    10/23/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.4    10/24/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.5    10/25/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.6    10/26/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.7    10/27/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.8    10/28/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.9    10/29/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.0    10/30/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.1    10/31/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.2    11/01/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.3    11/02/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.4    11/04/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.5    11/05/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.6    11/06/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.7    11/07/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.8    11/08/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.9    11/09/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.0    11/10/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.1    11/11/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.2    11/12/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.3    11/13/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.4    11/14/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.5    11/15/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.6    11/16/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.7    11/17/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.8    11/18/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.9    11/19/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.0    11/20/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.1    11/21/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.2    11/23/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.3    11/24/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.4    11/25/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.5    11/26/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.6    11/27/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.7    11/28/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.8    11/29/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.9    11/30/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.0    12/01/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.1    12/02/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.2    12/03/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.3    12/04/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.4    12/05/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.5    12/07/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.6    12/08/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.7    12/09/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.8    12/10/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.9    12/11/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.0    12/12/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.1    12/13/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.2    12/14/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.3    12/15/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.4    12/16/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.5    12/17/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.6    12/18/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.7    12/19/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.8    12/20/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.9    12/21/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.0    12/22/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.1    12/23/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.2    12/24/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.3    12/25/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.4    12/26/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.5    12/27/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.6    12/28/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.7    12/29/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.8    12/30/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.9    12/31/2024    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.0    01/01/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.1    01/02/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.2    01/03/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.3    01/04/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.4    01/05/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.5    01/06/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.6    01/07/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.7    01/08/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.8    01/09/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.9    01/10/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.0    01/11/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.1    01/12/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.2    01/13/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.3    01/15/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.4    01/16/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.5    01/17/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.6    01/18/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.7    01/19/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.8    01/20/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.9    01/21/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.0    01/22/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.1    01/23/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.2    01/24/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.3    01/25/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.4    01/27/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.5    01/28/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.6    01/29/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.7    01/30/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.8    02/01/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.9    02/02/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.0    02/03/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.1    02/04/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.2    02/05/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.3    02/07/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.4    02/08/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.5    02/09/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.6    02/10/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.7    02/11/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.8    02/12/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.9    02/13/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.0    02/14/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.1    02/15/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.2    02/16/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.3    02/17/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.4    02/18/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.5    02/19/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.6    02/20/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.7    02/21/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.8    02/22/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.9    02/23/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.0    02/24/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.1    02/25/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.2    02/26/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.3    02/27/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.4    02/28/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.5    03/01/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.6    03/02/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.7    03/03/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.8    03/04/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.9    03/05/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.0    03/06/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.1    03/08/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.2    03/09/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.3    03/10/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.4    03/11/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.5    03/12/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.6    03/14/2025    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-1393
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-6
Unknown None
Azure Linux 3.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-6
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-4
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-1393 None

CVE-2019-3833 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3833
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    04/02/2024    

Information published.


1.6    06/30/2024    

Information published.


1.7    07/08/2024    

Information published.


1.8    07/09/2024    

Information published.


1.9    07/10/2024    

Information published.


2.0    07/12/2024    

Information published.


2.1    07/13/2024    

Information published.


2.2    07/14/2024    

Information published.


2.3    07/15/2024    

Information published.


2.4    07/16/2024    

Information published.


2.5    07/17/2024    

Information published.


2.6    07/19/2024    

Information published.


2.7    07/20/2024    

Information published.


2.8    07/21/2024    

Information published.


2.9    07/22/2024    

Information published.


3.0    07/23/2024    

Information published.


3.1    07/24/2024    

Information published.


3.2    07/25/2024    

Information published.


3.3    07/26/2024    

Information published.


3.4    07/27/2024    

Information published.


3.5    07/28/2024    

Information published.


3.6    07/29/2024    

Information published.


3.7    08/02/2024    

Information published.


3.8    08/03/2024    

Information published.


3.9    08/04/2024    

Information published.


4.0    08/05/2024    

Information published.


4.1    08/06/2024    

Information published.


4.2    08/07/2024    

Information published.


4.3    08/08/2024    

Information published.


4.4    08/09/2024    

Information published.


4.5    08/10/2024    

Information published.


4.6    08/11/2024    

Information published.


4.7    08/12/2024    

Information published.


4.8    08/16/2024    

Information published.


4.9    08/17/2024    

Information published.


5.0    08/18/2024    

Information published.


5.1    08/19/2024    

Information published.


5.2    08/20/2024    

Information published.


5.3    08/21/2024    

Information published.


5.4    08/22/2024    

Information published.


5.5    08/23/2024    

Information published.


5.6    08/24/2024    

Information published.


5.7    08/25/2024    

Information published.


5.8    08/26/2024    

Information published.


5.9    08/27/2024    

Information published.


6.0    08/28/2024    

Information published.


6.1    08/29/2024    

Information published.


6.2    08/30/2024    

Information published.


6.3    08/31/2024    

Information published.


6.4    09/01/2024    

Information published.


6.5    09/02/2024    

Information published.


6.6    09/03/2024    

Information published.


6.7    09/05/2024    

Information published.


6.8    09/06/2024    

Information published.


6.9    09/07/2024    

Information published.


7.0    09/08/2024    

Information published.


7.1    09/11/2024    

Information published.


7.2    09/12/2024    

Information published.


7.3    09/13/2024    

Information published.


7.4    09/14/2024    

Information published.


7.5    09/15/2024    

Information published.


7.6    09/16/2024    

Information published.


7.7    09/17/2024    

Information published.


7.8    09/18/2024    

Information published.


7.9    09/19/2024    

Information published.


8.0    09/20/2024    

Information published.


8.1    09/21/2024    

Information published.


8.2    09/22/2024    

Information published.


8.3    09/23/2024    

Information published.


8.4    09/24/2024    

Information published.


8.5    09/25/2024    

Information published.


8.6    09/26/2024    

Information published.


8.7    09/27/2024    

Information published.


8.8    09/28/2024    

Information published.


8.9    09/29/2024    

Information published.


9.0    09/30/2024    

Information published.


9.1    10/01/2024    

Information published.


9.2    10/02/2024    

Information published.


9.3    10/03/2024    

Information published.


9.4    10/04/2024    

Information published.


9.5    10/05/2024    

Information published.


9.6    10/06/2024    

Information published.


9.7    10/07/2024    

Information published.


9.8    10/09/2024    

Information published.


9.9    10/10/2024    

Information published.


10.0    10/11/2024    

Information published.


10.1    10/12/2024    

Information published.


10.2    10/13/2024    

Information published.


10.3    10/14/2024    

Information published.


10.4    10/15/2024    

Added openwsman to CBL-Mariner 2.0


10.5    10/16/2024    

Added openwsman to CBL-Mariner 2.0


10.6    10/17/2024    

Added openwsman to CBL-Mariner 2.0


10.7    10/18/2024    

Added openwsman to CBL-Mariner 2.0


10.8    10/19/2024    

Added openwsman to CBL-Mariner 2.0


10.9    10/20/2024    

Added openwsman to CBL-Mariner 2.0


11.0    10/21/2024    

Added openwsman to CBL-Mariner 2.0


11.1    10/22/2024    

Added openwsman to CBL-Mariner 2.0


11.2    10/23/2024    

Added openwsman to CBL-Mariner 2.0


11.3    10/24/2024    

Added openwsman to CBL-Mariner 2.0


11.4    10/25/2024    

Added openwsman to CBL-Mariner 2.0


11.5    10/26/2024    

Added openwsman to CBL-Mariner 2.0


11.6    10/27/2024    

Added openwsman to CBL-Mariner 2.0


11.7    10/28/2024    

Added openwsman to CBL-Mariner 2.0


11.8    10/29/2024    

Added openwsman to CBL-Mariner 2.0


11.9    10/30/2024    

Added openwsman to CBL-Mariner 2.0


12.0    10/31/2024    

Added openwsman to CBL-Mariner 2.0


12.1    11/01/2024    

Added openwsman to CBL-Mariner 2.0


12.2    11/02/2024    

Added openwsman to CBL-Mariner 2.0


12.3    11/04/2024    

Added openwsman to CBL-Mariner 2.0


12.4    11/05/2024    

Added openwsman to CBL-Mariner 2.0


12.5    11/06/2024    

Added openwsman to CBL-Mariner 2.0


12.6    11/07/2024    

Added openwsman to CBL-Mariner 2.0


12.7    11/08/2024    

Added openwsman to CBL-Mariner 2.0


12.8    11/09/2024    

Added openwsman to CBL-Mariner 2.0


12.9    11/10/2024    

Added openwsman to CBL-Mariner 2.0


13.0    11/11/2024    

Added openwsman to CBL-Mariner 2.0


13.1    11/12/2024    

Added openwsman to CBL-Mariner 2.0


13.2    11/13/2024    

Added openwsman to CBL-Mariner 2.0


13.3    11/14/2024    

Added openwsman to CBL-Mariner 2.0


13.4    11/15/2024    

Added openwsman to CBL-Mariner 2.0


13.5    11/16/2024    

Added openwsman to CBL-Mariner 2.0


13.6    11/17/2024    

Added openwsman to CBL-Mariner 2.0


13.7    11/18/2024    

Added openwsman to CBL-Mariner 2.0


13.8    11/19/2024    

Added openwsman to CBL-Mariner 2.0


13.9    11/20/2024    

Added openwsman to CBL-Mariner 2.0


14.0    11/21/2024    

Added openwsman to CBL-Mariner 2.0


14.1    11/23/2024    

Added openwsman to CBL-Mariner 2.0


14.2    11/24/2024    

Added openwsman to CBL-Mariner 2.0


14.3    11/25/2024    

Added openwsman to CBL-Mariner 2.0


14.4    11/26/2024    

Added openwsman to CBL-Mariner 2.0


14.5    11/27/2024    

Added openwsman to CBL-Mariner 2.0


14.6    11/28/2024    

Added openwsman to CBL-Mariner 2.0


14.7    11/29/2024    

Added openwsman to CBL-Mariner 2.0


14.8    11/30/2024    

Added openwsman to CBL-Mariner 2.0


14.9    12/01/2024    

Added openwsman to CBL-Mariner 2.0


15.0    12/02/2024    

Added openwsman to CBL-Mariner 2.0


15.1    12/03/2024    

Added openwsman to CBL-Mariner 2.0


15.2    12/04/2024    

Added openwsman to CBL-Mariner 2.0


15.3    12/05/2024    

Added openwsman to CBL-Mariner 2.0


15.4    12/07/2024    

Added openwsman to CBL-Mariner 2.0


15.5    12/08/2024    

Added openwsman to CBL-Mariner 2.0


15.6    12/09/2024    

Added openwsman to CBL-Mariner 2.0


15.7    12/10/2024    

Added openwsman to CBL-Mariner 2.0


15.8    12/11/2024    

Added openwsman to CBL-Mariner 2.0


15.9    12/12/2024    

Added openwsman to CBL-Mariner 2.0


16.0    12/13/2024    

Added openwsman to CBL-Mariner 2.0


16.1    12/14/2024    

Added openwsman to CBL-Mariner 2.0


16.2    12/15/2024    

Added openwsman to CBL-Mariner 2.0


16.3    12/16/2024    

Added openwsman to CBL-Mariner 2.0


16.4    12/17/2024    

Added openwsman to CBL-Mariner 2.0


16.5    12/18/2024    

Added openwsman to CBL-Mariner 2.0


16.6    12/19/2024    

Added openwsman to CBL-Mariner 2.0


16.7    12/20/2024    

Added openwsman to CBL-Mariner 2.0


16.8    12/21/2024    

Added openwsman to CBL-Mariner 2.0


16.9    12/22/2024    

Added openwsman to CBL-Mariner 2.0


17.0    12/23/2024    

Added openwsman to CBL-Mariner 2.0


17.1    12/24/2024    

Added openwsman to CBL-Mariner 2.0


17.2    12/25/2024    

Added openwsman to CBL-Mariner 2.0


17.3    12/26/2024    

Added openwsman to CBL-Mariner 2.0


17.4    12/27/2024    

Added openwsman to CBL-Mariner 2.0


17.5    12/28/2024    

Added openwsman to CBL-Mariner 2.0


17.6    12/29/2024    

Added openwsman to CBL-Mariner 2.0


17.7    12/30/2024    

Added openwsman to CBL-Mariner 2.0


17.8    12/31/2024    

Added openwsman to CBL-Mariner 2.0


17.9    01/01/2025    

Added openwsman to CBL-Mariner 2.0


18.0    01/02/2025    

Added openwsman to CBL-Mariner 2.0


18.1    01/03/2025    

Added openwsman to CBL-Mariner 2.0


18.2    01/04/2025    

Added openwsman to CBL-Mariner 2.0


18.3    01/05/2025    

Added openwsman to CBL-Mariner 2.0


18.4    01/06/2025    

Added openwsman to CBL-Mariner 2.0


18.5    01/07/2025    

Added openwsman to CBL-Mariner 2.0


18.6    01/08/2025    

Added openwsman to CBL-Mariner 2.0


18.7    01/09/2025    

Added openwsman to CBL-Mariner 2.0


18.8    01/10/2025    

Added openwsman to CBL-Mariner 2.0


18.9    01/11/2025    

Added openwsman to CBL-Mariner 2.0


19.0    01/12/2025    

Added openwsman to CBL-Mariner 2.0


19.1    01/13/2025    

Added openwsman to CBL-Mariner 2.0


19.2    01/15/2025    

Added openwsman to CBL-Mariner 2.0


19.3    01/16/2025    

Added openwsman to CBL-Mariner 2.0


19.4    01/17/2025    

Added openwsman to CBL-Mariner 2.0


19.5    01/18/2025    

Added openwsman to CBL-Mariner 2.0


19.6    01/19/2025    

Added openwsman to CBL-Mariner 2.0


19.7    01/20/2025    

Added openwsman to CBL-Mariner 2.0


19.8    01/21/2025    

Added openwsman to CBL-Mariner 2.0


19.9    01/22/2025    

Added openwsman to CBL-Mariner 2.0


20.0    01/23/2025    

Added openwsman to CBL-Mariner 2.0


20.1    01/24/2025    

Added openwsman to CBL-Mariner 2.0


20.2    01/25/2025    

Added openwsman to CBL-Mariner 2.0


20.3    01/27/2025    

Added openwsman to CBL-Mariner 2.0


20.4    01/28/2025    

Added openwsman to CBL-Mariner 2.0


20.5    01/29/2025    

Added openwsman to CBL-Mariner 2.0


20.6    01/30/2025    

Added openwsman to CBL-Mariner 2.0


20.7    02/01/2025    

Added openwsman to CBL-Mariner 2.0


20.8    02/02/2025    

Added openwsman to CBL-Mariner 2.0


20.9    02/03/2025    

Added openwsman to CBL-Mariner 2.0


21.0    02/04/2025    

Added openwsman to CBL-Mariner 2.0


21.1    02/05/2025    

Added openwsman to CBL-Mariner 2.0


21.2    02/07/2025    

Added openwsman to CBL-Mariner 2.0


21.3    02/08/2025    

Added openwsman to CBL-Mariner 2.0


21.4    02/09/2025    

Added openwsman to CBL-Mariner 2.0


21.5    02/10/2025    

Added openwsman to CBL-Mariner 2.0


21.6    02/11/2025    

Added openwsman to CBL-Mariner 2.0


21.7    02/12/2025    

Added openwsman to CBL-Mariner 2.0


21.8    02/13/2025    

Added openwsman to CBL-Mariner 2.0


21.9    02/14/2025    

Added openwsman to CBL-Mariner 2.0


22.0    02/15/2025    

Added openwsman to CBL-Mariner 2.0


22.1    02/16/2025    

Added openwsman to CBL-Mariner 2.0


22.2    02/17/2025    

Added openwsman to CBL-Mariner 2.0


22.3    02/18/2025    

Added openwsman to CBL-Mariner 2.0


22.4    02/19/2025    

Added openwsman to CBL-Mariner 2.0


22.5    02/20/2025    

Added openwsman to CBL-Mariner 2.0


22.6    02/21/2025    

Added openwsman to CBL-Mariner 2.0


22.7    02/22/2025    

Added openwsman to CBL-Mariner 2.0


22.8    02/23/2025    

Added openwsman to CBL-Mariner 2.0


22.9    02/24/2025    

Added openwsman to CBL-Mariner 2.0


23.0    02/25/2025    

Added openwsman to CBL-Mariner 2.0


23.1    02/26/2025    

Added openwsman to CBL-Mariner 2.0


23.2    02/27/2025    

Added openwsman to CBL-Mariner 2.0


23.3    02/28/2025    

Added openwsman to CBL-Mariner 2.0


23.4    03/01/2025    

Added openwsman to CBL-Mariner 2.0


23.5    03/02/2025    

Added openwsman to CBL-Mariner 2.0


23.6    03/03/2025    

Added openwsman to CBL-Mariner 2.0


23.7    03/04/2025    

Added openwsman to CBL-Mariner 2.0


23.8    03/05/2025    

Added openwsman to CBL-Mariner 2.0


23.9    03/06/2025    

Added openwsman to CBL-Mariner 2.0


24.0    03/08/2025    

Added openwsman to CBL-Mariner 2.0


24.1    03/09/2025    

Added openwsman to CBL-Mariner 2.0


24.2    03/10/2025    

Added openwsman to CBL-Mariner 2.0


24.3    03/11/2025    

Added openwsman to CBL-Mariner 2.0


24.4    03/12/2025    

Added openwsman to CBL-Mariner 2.0


24.5    03/14/2025    

Added openwsman to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3833
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.8-13
Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.8-13
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3833 None

CVE-2024-12133 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-12133
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/04/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-12133
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libtasn1 (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
4.19.0-2
Unknown None
Azure Linux 3.0 x64 libtasn1 (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
4.19.0-2
Unknown None
CBL Mariner 2.0 ARM gnutls (CBL-Mariner)
libtasn1 (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.7.11-2

4.19.0-2
None
CBL Mariner 2.0 x64 gnutls (CBL-Mariner)
libtasn1 (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.7.11-2

4.19.0-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-12133 None

CVE-2024-26943 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26943
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    03/05/2025    

Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26943
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26943 None

CVE-2024-27026 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-27026
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    03/06/2025    

Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-27026
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-27026 None

CVE-2024-35790 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-35790
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    03/06/2025    

Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-35790
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-35790 None

CVE-2024-35792 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-35792
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/11/2024    

Information published.


1.1    03/06/2025    

Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-35792
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-35792 None

CVE-2024-27061 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-27061
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06/30/2024    

Information published.


1.1    03/06/2025    

Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-27061
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.29.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.29.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-27061 None

CVE-2024-40982 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-40982
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-40982
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.176.3-2
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.176.3-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-40982 None

CVE-2024-43098 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43098
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43098
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43098 None

CVE-2024-53146 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53146
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53146
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53146 None

CVE-2025-22868 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-22868
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/09/2025    

Information published.


0.3    03/10/2025    

Information published.


0.4    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-22868
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM azcopy (CBL-Mariner)
cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-2

1.12.15-2
1.57.0-13
1.11.4-3
None
Azure Linux 3.0 x64 azcopy (CBL-Mariner)
cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-2

1.12.15-2
1.57.0-13
1.11.4-3
None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-3

2.1.2-8
1.11.2-20
1.11.1-14
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-3

2.1.2-8
1.11.2-20
1.11.1-14
None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-22868 None

CVE-2024-53157 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53157
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53157 None

CVE-2024-53156 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53156
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53156 None

CVE-2024-53165 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53165
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53165 None

CVE-2024-53171 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53171
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53171 None

CVE-2024-56369 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56369
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56369
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56369 None

CVE-2024-53227 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53227
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53227
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53227 None

CVE-2024-53237 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53237
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53237
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53237 None

CVE-2024-53217 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53217
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53217
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53217 None

CVE-2024-56569 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56569
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56569
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56569 None

CVE-2024-56572 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56572
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56572
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56572 None

CVE-2024-56578 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56578
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56578
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56578 None

CVE-2024-56574 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56574
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56574
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56574 None

CVE-2024-56593 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56593
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56593
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56593 None

CVE-2024-56622 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56622
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56622
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56622 None

CVE-2024-56606 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56606
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56606
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56606 None

CVE-2024-56601 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56601
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56601
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56601 None

CVE-2024-56602 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56602
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56602
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56602 None

CVE-2024-56698 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56698
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56698
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56698 None

CVE-2024-56704 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56704
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56704
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56704 None

CVE-2024-56715 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56715
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56715
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56715 None

CVE-2024-56642 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56642
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56642
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56642 None

CVE-2024-56716 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56716
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56716
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56716 None

CVE-2024-56726 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56726
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56726
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56726 None

CVE-2024-56746 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56746
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56746
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56746 None

CVE-2024-56723 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56723
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56723
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56723 None

CVE-2024-56739 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56739
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56739
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56739 None

CVE-2024-56748 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56748
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56748
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56748 None

CVE-2024-56776 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56776
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56776
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56776 None

CVE-2024-56779 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56779
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56779
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56779 None

CVE-2024-56778 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56778
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56778
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56778 None

CVE-2024-56780 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56780
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56780
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56780 None

CVE-2024-56785 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56785
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56785
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56785 None

CVE-2024-57874 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57874
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57874
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57874 None

CVE-2024-57896 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57896
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57896
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57896 None

CVE-2024-57841 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57841
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57841
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57841 None

CVE-2024-57890 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57890
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57890
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57890 None

CVE-2024-36476 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36476
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36476
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36476 None

CVE-2024-57946 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57946
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57946
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-3
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57946 None

CVE-2024-9287 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9287
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9287
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.12.9-1
Unknown None
Azure Linux 3.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.12.9-1
Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.9.19-11
Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.9.19-11
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9287 None

CVE-2025-22869 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-22869
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/10/2025    

Information published.


0.3    03/12/2025    

Information published.


0.4    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-22869
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
docker-buildx (CBL-Mariner)
docker-compose (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.12.15-2

8.7.11-2
0.14.0-4
2.27.0-4
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
docker-buildx (CBL-Mariner)
docker-compose (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.12.15-2

8.7.11-2
0.14.0-4
2.27.0-4
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
kubernetes (CBL-Mariner)
kubevirt (CBL-Mariner)
moby-compose (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.11.2-20

1.28.4-15
0.59.0-25
2.17.3-10
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
kubernetes (CBL-Mariner)
kubevirt (CBL-Mariner)
moby-compose (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.11.2-20

1.28.4-15
0.59.0-25
2.17.3-10
None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-22869 None

CVE-2024-50051 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50051
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50051 None

CVE-2024-48881 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-48881
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-48881
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-48881 None

CVE-2024-53145 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53145
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53145
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53145 None

CVE-2024-53096 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53096
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53096
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53096 None

CVE-2024-53206 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53206
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53206
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53206 None

CVE-2024-53239 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53239
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53239
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53239 None

CVE-2024-53173 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53173
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53173 None

CVE-2024-53226 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53226
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53226
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53226 None

CVE-2024-56575 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56575
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56575
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56575 None

CVE-2024-56581 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56581
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56581
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56581 None

CVE-2024-56595 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56595
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56595
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56595 None

CVE-2024-56587 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56587
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56587
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56587 None

CVE-2024-56596 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56596
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56596
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56596 None

CVE-2024-56614 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56614
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56614
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56614 None

CVE-2024-56605 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56605
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56605
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56605 None

CVE-2024-56615 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56615
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56615
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56615 None

CVE-2024-56603 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56603
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56603
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56603 None

CVE-2024-56623 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56623
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56623
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56623 None

CVE-2024-56643 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56643
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56643
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 x64 Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56643 None

CVE-2024-56650 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56650
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56650
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56650 None

CVE-2024-56648 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56648
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56648
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56648 None

CVE-2024-56629 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56629
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56629
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56629 None

CVE-2024-56670 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56670
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56670
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56670 None

CVE-2024-56694 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56694
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56694
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56694 None

CVE-2024-56688 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56688
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56688
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56688 None

CVE-2024-56708 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56708
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56708
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56708 None

CVE-2024-56747 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56747
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56747
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56747 None

CVE-2024-56745 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56745
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56745
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56745 None

CVE-2024-56756 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56756
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/29/2025    

Information published.


0.2    03/08/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56756
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56756 None

CVE-2024-56770 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56770
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56770
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56770 None

CVE-2024-56781 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56781
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56781
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56781 None

CVE-2024-56787 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56787
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56787
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56787 None

CVE-2024-57850 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57850
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57850
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-3
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57850 None

CVE-2024-57902 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57902
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/08/2025    

Information published.


0.2    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57902
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-3
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57902 None

CVE-2024-50302 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50302
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/12/2024    

Information published.


1.1    01/29/2025    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


1.2    03/10/2025    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50302
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.15.173.1-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.15.173.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50302 None

CVE-2025-27516 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27516
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27516
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM python-jinja2 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.0.3-6
Unknown None
CBL Mariner 2.0 x64 python-jinja2 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.0.3-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27516 None

CVE-2025-26600 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26600
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26600
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26600 None

CVE-2025-26597 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26597
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26597
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26597 None

CVE-2025-1744 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1744
MITRE
NVD

Issuing CNA: cve_disclosure@tech.gov.sg

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1744
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM binutils (CBL-Mariner)
ceph (CBL-Mariner)
cloud-hypervisor (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.37-14

16.2.10-7
32.0-5
None
CBL Mariner 2.0 x64 binutils (CBL-Mariner)
ceph (CBL-Mariner)
cloud-hypervisor (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.37-14

16.2.10-7
32.0-5
None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1744 None

CVE-2025-27423 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27423
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27423
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
9.1.1164-1
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
9.1.1164-1
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
9.1.1164-1
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
9.1.1164-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27423 None

CVE-2025-26599 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26599
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26599
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26599 None

CVE-2025-26601 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26601
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/10/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26601
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-1
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26601 None

CVE-2024-43802 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43802
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:4.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/18/2024    

Information published.


1.1    10/24/2024    

Added vim to Azure Linux 3.0 Added vim to CBL-Mariner 2.0


1.2    03/11/2025    

Added vim to Azure Linux 3.0 Added vim to CBL-Mariner 2.0


1.3    03/12/2025    

Added vim to CBL-Mariner 2.0 Added vim to Azure Linux 3.0


1.4    03/14/2025    

Added vim to Azure Linux 3.0 Added vim to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43802
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.1.1164-1
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.1.1164-1
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.1.1164-1
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.1.1164-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43802 None

CVE-2024-45337 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45337
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:9.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    12/20/2024    

Information published.


0.2    12/21/2024    

Information published.


0.3    12/24/2024    

Information published.


0.4    12/25/2024    

Information published.


0.5    12/26/2024    

Information published.


0.6    12/27/2024    

Information published.


0.7    01/09/2025    

Information published.


0.8    01/17/2025    

Information published.


0.9    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45337
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
docker-buildx (CBL-Mariner)
docker-compose (CBL-Mariner)
Unknown Unknown Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1.12.13-2

8.7.3-4
0.14.0-2
2.27.0-2
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
docker-buildx (CBL-Mariner)
docker-compose (CBL-Mariner)
Unknown Unknown Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1.12.13-2

8.7.3-4
0.14.0-2
2.27.0-2
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
moby-compose (CBL-Mariner)
moby-engine (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1.11.2-16

2.17.3-9
24.0.9-12
1.9.5-5
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
moby-compose (CBL-Mariner)
moby-engine (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1.11.2-16

2.17.3-9
24.0.9-12
1.9.5-5
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45337 None

CVE-2024-36621 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36621
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    12/13/2024    

Information published.


0.2    12/19/2024    

Information published.


0.3    12/23/2024    

Information published.


0.4    12/24/2024    

Information published.


0.5    12/25/2024    

Information published.


0.6    12/26/2024    

Information published.


0.7    12/27/2024    

Information published.


0.8    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36621
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM moby-engine (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
25.0.3-8
Unknown None
Azure Linux 3.0 x64 moby-engine (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
25.0.3-8
Unknown None
CBL Mariner 2.0 ARM moby-engine (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
24.0.9-11
Unknown None
CBL Mariner 2.0 x64 moby-engine (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
24.0.9-11
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36621 None

CVE-2024-36623 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36623
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    12/13/2024    

Information published.


0.2    12/14/2024    

Information published.


0.3    12/19/2024    

Information published.


0.4    12/23/2024    

Information published.


0.5    12/24/2024    

Information published.


0.6    12/25/2024    

Information published.


0.7    12/26/2024    

Information published.


0.8    12/27/2024    

Information published.


0.9    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36623
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM docker-cli (CBL-Mariner)
moby-engine (CBL-Mariner)
Unknown Unknown Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
25.0.3-3

25.0.3-8
None
Azure Linux 3.0 x64 docker-cli (CBL-Mariner)
moby-engine (CBL-Mariner)
Unknown Unknown Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
25.0.3-3

25.0.3-8
None
CBL Mariner 2.0 ARM moby-cli (CBL-Mariner)
moby-compose (CBL-Mariner)
moby-engine (CBL-Mariner)
Unknown Unknown Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
24.0.9-5

2.17.3-8
24.0.9-11
None
CBL Mariner 2.0 x64 moby-cli (CBL-Mariner)
moby-compose (CBL-Mariner)
moby-engine (CBL-Mariner)
Unknown Unknown Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
24.0.9-5

2.17.3-8
24.0.9-11
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36623 None

CVE-2023-6121 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6121
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/12/2024    

Information published.


1.1    12/18/2024    

Added hyperv-daemons to CBL-Mariner 2.0


1.2    03/12/2025    

Added hyperv-daemons to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6121
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.15.145.2-1
Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.15.145.2-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6121 None

CVE-2023-6817 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6817
MITRE
NVD

Issuing CNA: cve-coordination@google.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/12/2024    

Information published.


1.1    12/18/2024    

Added kernel to CBL-Mariner 2.0


1.2    03/12/2025    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6817
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.145.2-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.145.2-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6817 None

CVE-2023-2455 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-2455
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/12/2024    

Information published.


1.1    12/18/2024    

Added postgresql to CBL-Mariner 2.0


1.2    03/12/2025    

Added postgresql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-2455
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM postgresql (CBL-Mariner) Unknown Unknown Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
14.11-1
Unknown None
CBL Mariner 2.0 x64 postgresql (CBL-Mariner) Unknown Unknown Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
14.11-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-2455 None

CVE-2025-0665 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0665
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0665
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM curl (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
8.11.1-3
Unknown None
Azure Linux 3.0 x64 curl (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
8.11.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0665 None

CVE-2025-0167 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0167
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.4/TemporalScore:3.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM curl (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
8.11.1-3
Unknown None
Azure Linux 3.0 x64 curl (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
8.11.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0167 None

CVE-2024-11053 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-11053
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.4/TemporalScore:3.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/17/2025    

Information published.


0.2    02/17/2025    

Information published.


0.3    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-11053
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
3.30.3-3

8.11.1-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
3.30.3-3

8.11.1-1
None
CBL Mariner 2.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
3.21.4-15

8.8.0-4
None
CBL Mariner 2.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
3.21.4-15

8.8.0-4
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-11053 None

CVE-2025-0633 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0633
MITRE
NVD

Issuing CNA: PSIRT@samsung.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0633
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM iniparser (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
4.1-8
Unknown None
Azure Linux 3.0 x64 iniparser (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
4.1-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0633 None

CVE-2023-48795 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-48795
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/25/2023    

Information published.


1.1    12/27/2023    

Added moby-cli to CBL-Mariner 2.0


1.2    06/30/2024    

Information published.


1.3    08/16/2024    

Information published.


1.4    08/25/2024    

Information published.


1.5    08/26/2024    

Information published.


1.6    08/27/2024    

Information published.


1.7    08/28/2024    

Information published.


1.8    08/29/2024    

Information published.


1.9    08/30/2024    

Information published.


2.0    08/31/2024    

Information published.


2.1    09/01/2024    

Information published.


2.2    09/02/2024    

Information published.


2.3    09/03/2024    

Information published.


2.4    09/05/2024    

Information published.


2.5    09/06/2024    

Information published.


2.6    09/07/2024    

Information published.


2.7    09/08/2024    

Information published.


2.8    09/11/2024    

Information published.


2.9    11/09/2024    

Added kubevirt to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added moby-compose to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added erlang to CBL-Mariner 2.0 Added libssh2 to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added openssh to CBL-Mariner 2.0 Added libssh to CBL-Mariner 2.0


3.0    03/13/2025    

Added cf-cli to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added moby-compose to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added erlang to CBL-Mariner 2.0 Added libssh2 to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added openssh to CBL-Mariner 2.0 Added libssh to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-48795
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
docker-buildx (CBL-Mariner)
kubernetes (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1.12.12-1

8.7.11-1
0.14.0-1
1.30.1-1
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
docker-buildx (CBL-Mariner)
kubernetes (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1.12.12-1

8.7.11-1
0.14.0-1
1.30.1-1
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
erlang (CBL-Mariner)
kubernetes (CBL-Mariner)
libssh (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1.11.2-7

25.2-2
1.28.4-4
0.10.6-1
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
erlang (CBL-Mariner)
kubernetes (CBL-Mariner)
libssh (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1.11.2-7

25.2-2
1.28.4-4
0.10.6-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-48795 None

CVE-2024-6874 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6874
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/01/2024    

Information published.


1.1    03/13/2025    

Added curl to Azure Linux 3.0 Added cmake to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6874
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.30.3-2

8.11.1-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.30.3-2

8.11.1-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6874 None

CVE-2024-47141 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-47141
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-47141
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-47141 None

CVE-2024-48875 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-48875
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-48875
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-48875 None

CVE-2024-54680 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-54680
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-54680
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-54680 None

CVE-2024-56582 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56582
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56582
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56582 None

CVE-2024-56613 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56613
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56613
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56613 None

CVE-2024-56611 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56611
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56611
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56611 None

CVE-2024-56617 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56617
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56617
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56617 None

CVE-2024-56649 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56649
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56649
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56649 None

CVE-2024-56653 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56653
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56653
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56653 None

CVE-2024-56654 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56654
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56654
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56654 None

CVE-2024-56655 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56655
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56655
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56655 None

CVE-2024-56663 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56663
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56663
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56663 None

CVE-2024-56667 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56667
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56667
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56667 None

CVE-2024-56703 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56703
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56703
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56703 None

CVE-2024-56718 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56718
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56718
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56718 None

CVE-2024-56719 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56719
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56719
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56719 None

CVE-2024-56767 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56767
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56767
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56767 None

CVE-2024-56769 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56769
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56769
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56769 None

CVE-2024-57801 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57801
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57801
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57801 None

CVE-2024-57882 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57882
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57882
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57882 None

CVE-2024-57887 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57887
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57887
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57887 None

CVE-2024-57908 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57908
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57908
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57908 None

CVE-2024-57922 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57922
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57922
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57922 None

CVE-2024-57910 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57910
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57910
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57910 None

CVE-2024-57916 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57916
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57916
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57916 None

CVE-2024-57925 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57925
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57925
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57925 None

CVE-2024-57933 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57933
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57933
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57933 None

CVE-2024-57926 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57926
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57926
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57926 None

CVE-2024-57939 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57939
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57939
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57939 None

CVE-2024-57973 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57973
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57973
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57973 None

CVE-2024-57981 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57981
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57981
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57981 None

CVE-2024-57996 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57996
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57996
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57996 None

CVE-2024-58007 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-58007
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-58007
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-58007 None

CVE-2024-58017 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-58017
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-58017
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-58017 None

CVE-2024-58011 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-58011
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-58011
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-58011 None

CVE-2025-21640 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21640
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21640
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21640 None

CVE-2025-21642 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21642
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21642
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21642 None

CVE-2025-21652 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21652
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21652
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21652 None

CVE-2025-21667 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21667
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21667
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21667 None

CVE-2025-21658 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21658
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21658
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21658 None

CVE-2025-21669 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21669
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21669
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21669 None

CVE-2025-21670 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21670
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21670
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21670 None

CVE-2025-21674 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21674
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21674
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21674 None

CVE-2025-21675 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21675
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21675
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21675 None

CVE-2025-21681 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21681
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21681
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21681 None

CVE-2025-21683 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21683
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21683
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21683 None

CVE-2025-21692 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21692
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21692
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21692 None

CVE-2025-21697 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21697
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21697
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21697 None

CVE-2025-21694 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21694
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21694
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21694 None

CVE-2025-21707 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21707
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21707
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21707 None

CVE-2025-21711 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21711
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21711
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21711 None

CVE-2025-21743 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21743
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21743
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21743 None

CVE-2025-21748 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21748
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21748
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21748 None

CVE-2025-21749 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21749
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21749
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21749 None

CVE-2025-21820 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21820
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21820
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21820 None

CVE-2025-0426 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0426
MITRE
NVD

Issuing CNA: jordan@liggitt.net

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0426
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kubernetes (CBL-Mariner) Unknown Unknown Base: 6.2
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.30.10-1
Unknown None
Azure Linux 3.0 x64 kubernetes (CBL-Mariner) Unknown Unknown Base: 6.2
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.30.10-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0426 None

CVE-2020-13435 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2020-13435
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06/30/2024    

Information published.


1.1    03/14/2025    

Added libdb to Azure Linux 3.0 Added ceph to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2020-13435
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ceph (CBL-Mariner)
libdb (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
18.2.1-1

5.3.28-9
None
Azure Linux 3.0 x64 ceph (CBL-Mariner)
libdb (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
18.2.1-1

5.3.28-9
None

Acknowledgements

CVE ID Acknowledgements
CVE-2020-13435 None

CVE-2024-56171 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56171
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/27/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.11.5-4
Unknown None
Azure Linux 3.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.11.5-4
Unknown None
CBL Mariner 2.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.10.4-6
Unknown None
CBL Mariner 2.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.10.4-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56171 None

CVE-2025-24928 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24928
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/27/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24928
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.11.5-4
Unknown None
Azure Linux 3.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.11.5-4
Unknown None
CBL Mariner 2.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.10.4-6
Unknown None
CBL Mariner 2.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2.10.4-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24928 None

CVE-2025-27113 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27113
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/27/2025    

Information published.


0.2    02/28/2025    

Information published.


0.3    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27113
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.11.5-4
Unknown None
Azure Linux 3.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.11.5-4
Unknown None
CBL Mariner 2.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.10.4-6
Unknown None
CBL Mariner 2.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.10.4-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27113 None

CVE-2024-13176 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-13176
MITRE
NVD

Issuing CNA: openssl-security@openssl.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-13176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM openssl (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3.3.3-1
Unknown None
Azure Linux 3.0 x64 openssl (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3.3.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-13176 None

CVE-2024-28757 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28757
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06/30/2024    

Information published.


1.1    02/27/2025    

Added expat to CBL-Mariner 2.0 Added expat to Azure Linux 3.0


1.2    03/14/2025    

Added python3 to Azure Linux 3.0 Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28757
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.2-1

3.12.9-1
None
Azure Linux 3.0 x64 expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.2-1

3.12.9-1
None
CBL Mariner 2.0 ARM expat (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.2-2
Unknown None
CBL Mariner 2.0 x64 expat (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.2-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28757 None

CVE-2023-45803 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45803
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.2/TemporalScore:4.2
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/23/2023    

Information published.


1.1    08/29/2024    

Information published.


1.2    08/30/2024    

Information published.


1.3    08/31/2024    

Information published.


1.4    09/01/2024    

Information published.


1.5    09/02/2024    

Information published.


1.6    09/03/2024    

Information published.


1.7    09/05/2024    

Information published.


1.8    09/06/2024    

Information published.


1.9    09/07/2024    

Information published.


2.0    09/08/2024    

Information published.


2.1    09/11/2024    

Information published.


2.2    10/25/2024    

Added python-pip to Azure Linux 3.0 Added python-urllib3 to Azure Linux 3.0 Added python-urllib3 to CBL-Mariner 2.0


2.3    03/14/2025    

Added python3 to Azure Linux 3.0 Added python-pip to Azure Linux 3.0 Added python-urllib3 to Azure Linux 3.0 Added python-urllib3 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45803
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-pip (CBL-Mariner)
python-urllib3 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
24.2-1

2.0.7-1
3.12.9-1
None
Azure Linux 3.0 x64 python-pip (CBL-Mariner)
python-urllib3 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
24.2-1

2.0.7-1
3.12.9-1
None
CBL Mariner 2.0 ARM python-urllib3 (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1.26.18-1
Unknown None
CBL Mariner 2.0 x64 python-urllib3 (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1.26.18-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45803 None

CVE-2024-28180 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28180
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    04/11/2024    

Information published.


1.2    06/30/2024    

Information published.


1.3    08/16/2024    

Information published.


1.4    08/25/2024    

Information published.


1.5    08/26/2024    

Information published.


1.6    08/27/2024    

Information published.


1.7    08/28/2024    

Information published.


1.8    08/29/2024    

Information published.


1.9    08/30/2024    

Information published.


2.0    08/31/2024    

Information published.


2.1    09/01/2024    

Information published.


2.2    09/02/2024    

Information published.


2.3    09/03/2024    

Information published.


2.4    09/05/2024    

Information published.


2.5    09/06/2024    

Information published.


2.6    09/07/2024    

Information published.


2.7    09/08/2024    

Information published.


2.8    09/11/2024    

Information published.


2.9    09/13/2024    

Information published.


3.0    10/05/2024    

Information published.


3.1    10/09/2024    

Information published.


3.2    10/12/2024    

Information published.


3.3    10/16/2024    

Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


3.4    11/01/2024    

Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


3.5    11/09/2024    

Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0


3.6    11/14/2024    

Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


3.7    12/03/2024    

Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


3.8    01/24/2025    

Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


3.9    01/30/2025    

Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0


4.0    02/01/2025    

Added rook to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


4.1    02/13/2025    

Added moby-containerd to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


4.2    02/14/2025    

Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


4.3    02/16/2025    

Added moby-containerd-cc to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


4.4    02/26/2025    

Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0


4.5    03/14/2025    

Added packer to Azure Linux 3.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
containerd (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
dcos-cli (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.12.12-1

1.7.13-6
1.57.0-9
1.2.0-16
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
containerd (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
dcos-cli (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.12.12-1

1.7.13-6
1.57.0-9
1.2.0-16
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
dcos-cli (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.11.2-14

1.55.0-20
1.21.7-2
1.2.0-19
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
dcos-cli (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.11.2-14

1.55.0-20
1.21.7-2
1.2.0-19
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28180 None

CVE-2024-3219 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3219
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.12.9-1
Unknown None
Azure Linux 3.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.12.9-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3219 None

CVE-2024-4032 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4032
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/05/2024    

Information published.


1.1    03/14/2025    

Added python3 to Azure Linux 3.0 Added python3 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4032
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.12.9-1
Unknown None
Azure Linux 3.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.12.9-1
Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.9.19-6
Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.9.19-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4032 None

CVE-2024-45490 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45490
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/13/2024    

Information published.


1.1    10/15/2024    

Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


1.2    10/18/2024    

Added expat to CBL-Mariner 2.0 Added expat to Azure Linux 3.0


1.3    03/14/2025    

Added python3 to Azure Linux 3.0 Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45490
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-1

3.12.9-1
None
Azure Linux 3.0 x64 expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-1

3.12.9-1
None
CBL Mariner 2.0 ARM expat (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-1
Unknown None
CBL Mariner 2.0 x64 expat (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45490 None

CVE-2024-50602 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50602
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11/09/2024    

Information published.


1.1    03/14/2025    

Added python3 to Azure Linux 3.0 Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50602
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-2

3.12.9-1
None
Azure Linux 3.0 x64 expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-2

3.12.9-1
None
CBL Mariner 2.0 ARM expat (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-2
Unknown None
CBL Mariner 2.0 x64 expat (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.3-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50602 None

CVE-2024-45492 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45492
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/13/2024    

Information published.


1.1    10/15/2024    

Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


1.2    03/14/2025    

Added python3 to Azure Linux 3.0 Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45492
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1

3.12.9-1
None
Azure Linux 3.0 x64 expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1

3.12.9-1
None
CBL Mariner 2.0 ARM expat (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1
Unknown None
CBL Mariner 2.0 x64 expat (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45492 None

CVE-2025-0938 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0938
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/25/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0938
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.12.9-1
Unknown None
Azure Linux 3.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.12.9-1
Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-10
Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-10
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0938 None

CVE-2025-1215 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1215
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:2.8/TemporalScore:2.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/27/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 2.8
Temporal: 2.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
9.1.0791-4
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 2.8
Temporal: 2.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
9.1.0791-4
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 2.8
Temporal: 2.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
9.1.0791-4
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 2.8
Temporal: 2.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
9.1.0791-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1215 None

CVE-2025-26603 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26603
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.2/TemporalScore:4.2
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/27/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26603
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-4
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-4
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-4
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
9.1.0791-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26603 None

CVE-2019-25219 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-25219
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-25219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM asio (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1.31.0-1
Unknown None
Azure Linux 3.0 x64 asio (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1.31.0-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-25219 None

CVE-2023-52160 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-52160
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    03/04/2024    

Information published.


1.1    03/14/2025    

Added wpa_supplicant to Azure Linux 3.0 Added wpa_supplicant to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-52160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM wpa_supplicant (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
2.10-2
Unknown None
Azure Linux 3.0 x64 wpa_supplicant (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
2.10-2
Unknown None
CBL Mariner 2.0 ARM wpa_supplicant (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
2.10-2
Unknown None
CBL Mariner 2.0 x64 wpa_supplicant (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
2.10-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-52160 None

CVE-2024-24826 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-24826
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5/TemporalScore:5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-24826
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM exiv2 (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
0.28.3-1
Unknown None
Azure Linux 3.0 x64 exiv2 (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
0.28.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-24826 None

CVE-2024-25112 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-25112
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5/TemporalScore:5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-25112
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM exiv2 (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
0.28.3-1
Unknown None
Azure Linux 3.0 x64 exiv2 (CBL-Mariner) Unknown Unknown Base: 5
Temporal: 5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
0.28.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-25112 None

CVE-2016-10087 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2016-10087
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2016-10087
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2016-10087 None

CVE-2016-9840 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2016-9840
MITRE
NVD

Issuing CNA: security@opentext.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2016-9840
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2016-9840 None

CVE-2016-9841 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2016-9841
MITRE
NVD

Issuing CNA: security@opentext.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2016-9841
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2016-9841 None

CVE-2016-9842 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2016-9842
MITRE
NVD

Issuing CNA: security@opentext.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2016-9842
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2016-9842 None

CVE-2016-9843 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2016-9843
MITRE
NVD

Issuing CNA: security@opentext.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2016-9843
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2016-9843 None

CVE-2023-6992 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6992
MITRE
NVD

Issuing CNA: cna@cloudflare.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6992
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.3.8-1

2.5.12-4
None
Azure Linux 3.0 x64 fltk (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.3.8-1

2.5.12-4
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6992 None

CVE-2023-25564 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-25564
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-25564
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gssntlmssp (CBL-Mariner) Unknown Unknown Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1.3.1-1
Unknown None
Azure Linux 3.0 x64 gssntlmssp (CBL-Mariner) Unknown Unknown Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1.3.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-25564 None

CVE-2023-25567 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-25567
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-25567
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None
Azure Linux 3.0 x64 gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-25567 None

CVE-2023-25566 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-25566
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-25566
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None
Azure Linux 3.0 x64 gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-25566 None

CVE-2004-2779 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2004-2779
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2004-2779
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libid3tag (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.16.3-7
Unknown None
Azure Linux 3.0 x64 libid3tag (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.16.3-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2004-2779 None

CVE-2024-36039 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36039
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36039
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-PyMySQL (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1.1.1-3
Unknown None
Azure Linux 3.0 x64 python-PyMySQL (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1.1.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36039 None

CVE-2024-49769 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49769
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49769
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-waitress (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.1-1
Unknown None
Azure Linux 3.0 x64 python-waitress (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49769 None

CVE-2024-34403 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-34403
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-34403
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM uriparser (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
0.9.8-3
Unknown None
Azure Linux 3.0 x64 uriparser (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
0.9.8-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-34403 None

CVE-2024-51744 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-51744
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:3.1/TemporalScore:3.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    01/30/2025    

Information published.


0.2    02/11/2025    

Information published.


0.3    02/20/2025    

Information published.


0.4    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-51744
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
etcd (CBL-Mariner)
Unknown Unknown Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1.7.7-1

1.12.15-1
1.11.4-1
3.5.18-1
None
Azure Linux 3.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
etcd (CBL-Mariner)
Unknown Unknown Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1.7.7-1

1.12.15-1
1.11.4-1
3.5.18-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-51744 None

CVE-2024-7264 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7264
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10/23/2024    

Information published.


1.1    10/25/2024    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


1.2    11/09/2024    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


1.3    12/04/2024    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


1.4    02/01/2025    

Added cmake to Azure Linux 3.0 Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


1.5    03/13/2025    

Added curl to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7264
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
3.30.3-4

8.11.1-1
8.0.40-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
3.30.3-4

8.11.1-1
8.0.40-1
None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8.0.40-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8.0.40-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7264 None

CVE-2023-3978 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-3978
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/08/2023    

Information published.


1.1    01/18/2024    

Added packer to CBL-Mariner 2.0


1.2    06/30/2024    

Information published.


1.3    07/10/2024    

Information published.


1.4    08/25/2024    

Information published.


1.5    08/26/2024    

Information published.


1.6    08/27/2024    

Information published.


1.7    08/28/2024    

Information published.


1.8    08/29/2024    

Information published.


1.9    08/30/2024    

Information published.


2.0    08/31/2024    

Information published.


2.1    09/01/2024    

Information published.


2.2    09/02/2024    

Information published.


2.3    09/03/2024    

Information published.


2.4    09/05/2024    

Information published.


2.5    09/06/2024    

Information published.


2.6    09/07/2024    

Information published.


2.7    09/08/2024    

Information published.


2.8    09/11/2024    

Information published.


2.9    09/13/2024    

Information published.


3.0    10/12/2024    

Information published.


3.1    10/15/2024    

Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0


3.2    11/01/2024    

Added cni-plugins to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0


3.3    12/03/2024    

Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0


3.4    02/11/2025    

Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0


3.5    02/16/2025    

Added kubevirt to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0


3.6    03/13/2025    

Added containerized-data-importer to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kubevirt to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-3978
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
kubevirt (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.7.7-1

1.12.12-1
1.57.0-12
1.2.0-1
None
Azure Linux 3.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
kubevirt (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.7.7-1

1.12.12-1
1.57.0-12
1.2.0-1
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
cni-plugins (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.11.2-14

1.3.0-6
0.59.0-24
4.0.2-5
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
cni-plugins (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.11.2-14

1.3.0-6
0.59.0-24
4.0.2-5
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-3978 None

CVE-2025-0725 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0725
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/14/2025    

Information published.


0.2    02/20/2025    

Information published.


0.3    02/21/2025    

Information published.


0.4    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0725
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
8.11.1-3

8.0.40-6
None
Azure Linux 3.0 x64 curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
8.11.1-3

8.0.40-6
None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
8.0.40-4
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
8.0.40-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0725 None

CVE-2024-10846 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-10846
MITRE
NVD

Issuing CNA: security@docker.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-10846
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM docker-compose (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
2.27.0-4
Unknown None
Azure Linux 3.0 x64 docker-compose (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
2.27.0-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-10846 None

CVE-2024-47809 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-47809
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-47809
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-47809 None

CVE-2025-25204 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25204
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25204
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gh (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
2.62.0-6
Unknown None
Azure Linux 3.0 x64 gh (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
2.62.0-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25204 None

CVE-2024-48873 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-48873
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-48873
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-48873 None

CVE-2024-53179 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53179
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53179
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53179 None

CVE-2024-54683 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-54683
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-54683
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-54683 None

CVE-2024-56631 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56631
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56631
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56631 None

CVE-2024-56635 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56635
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56635
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56635 None

CVE-2024-56604 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56604
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56604
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56604 None

CVE-2024-56651 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56651
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56651
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56651 None

CVE-2024-56660 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56660
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56660
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56660 None

CVE-2024-56665 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56665
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56665
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56665 None

CVE-2024-56664 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56664
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56664
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56664 None

CVE-2024-56672 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56672
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56672
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7
Temporal: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56672 None

CVE-2024-56675 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56675
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56675
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56675 None

CVE-2024-56717 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56717
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56717
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56717 None

CVE-2024-56760 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56760
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56760
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56760 None

CVE-2024-56783 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56783
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56783
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56783 None

CVE-2024-56765 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56765
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56765
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56765 None

CVE-2024-56766 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56766
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56766
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56766 None

CVE-2024-56786 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56786
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56786
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56786 None

CVE-2024-57798 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57798
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57798
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57798 None

CVE-2024-57895 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57895
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57895
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57895 None

CVE-2024-57906 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57906
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57906
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57906 None

CVE-2024-57907 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57907
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57907 None

CVE-2024-57911 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57911
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57911
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57911 None

CVE-2024-57913 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57913
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57913
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57913 None

CVE-2024-57940 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57940
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57940
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57940 None

CVE-2024-57949 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57949
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57949
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57949 None

CVE-2024-57951 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57951
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57951
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57951 None

CVE-2024-57997 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57997
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57997
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57997 None

CVE-2024-58005 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-58005
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-58005
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-58005 None

CVE-2024-58010 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-58010
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/13/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-58010
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-58010 None

CVE-2025-21636 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21636
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21636
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21636 None

CVE-2025-21631 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21631
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21631
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21631 None

CVE-2025-21639 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21639
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21639
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21639 None

CVE-2025-21666 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21666
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21666
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21666 None

CVE-2025-21665 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21665
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21665
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21665 None

CVE-2025-21673 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21673
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21673
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21673 None

CVE-2025-21676 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21676
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21676
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21676 None

CVE-2025-21684 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21684
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21684
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21684 None

CVE-2025-21689 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21689
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21689
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21689 None

CVE-2025-21687 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21687
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21687
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21687 None

CVE-2025-21690 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21690
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21690
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21690 None

CVE-2025-21699 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21699
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21699
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.76.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21699 None

CVE-2025-21735 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21735
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21735
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21735 None

CVE-2025-21736 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21736
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21736
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21736 None

CVE-2025-21741 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21741
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21741
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21741 None

CVE-2025-21742 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21742
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21742
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21742 None

CVE-2025-21744 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21744
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21744
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21744 None

CVE-2025-21745 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21745
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21745
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21745 None

CVE-2025-21814 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21814
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21814
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.78.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21814 None

CVE-2025-1390 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1390
MITRE
NVD

Issuing CNA: security@openanolis.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/27/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1390
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcap (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
2.69-2
Unknown None
Azure Linux 3.0 x64 libcap (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
2.69-2
Unknown None
CBL Mariner 2.0 ARM libcap (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
2.60-3
Unknown None
CBL Mariner 2.0 x64 libcap (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
2.60-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1390 None

CVE-2024-25062 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-25062
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/20/2024    

Information published.


1.1    03/14/2025    

Added libxml2 to Azure Linux 3.0 Added libxml2 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-25062
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.11.5-4
Unknown None
Azure Linux 3.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.11.5-4
Unknown None
CBL Mariner 2.0 ARM libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.10.4-4
Unknown None
CBL Mariner 2.0 x64 libxml2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.10.4-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-25062 None

CVE-2025-23359 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-23359
MITRE
NVD

Issuing CNA: psirt@nvidia.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.3/TemporalScore:8.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/23/2025    

Information published.


0.2    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-23359
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM nvidia-container-toolkit (CBL-Mariner) Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.17.4-1
Unknown None
Azure Linux 3.0 x64 nvidia-container-toolkit (CBL-Mariner) Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.17.4-1
Unknown None
CBL Mariner 2.0 ARM nvidia-container-toolkit (CBL-Mariner) Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.17.4-1
Unknown None
CBL Mariner 2.0 x64 nvidia-container-toolkit (CBL-Mariner) Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.17.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-23359 None

CVE-2024-12797 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-12797
MITRE
NVD

Issuing CNA: openssl-security@openssl.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02/21/2025    

Information published.


0.2    02/22/2025    

Information published.


0.3    02/26/2025    

Information published.


0.4    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-12797
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cloud-hypervisor-cvm (CBL-Mariner)
openssl (CBL-Mariner)
Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
38.0.72.2-3

3.3.3-1
None
Azure Linux 3.0 x64 cloud-hypervisor-cvm (CBL-Mariner)
openssl (CBL-Mariner)
Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
38.0.72.2-3

3.3.3-1
None
CBL Mariner 2.0 ARM cloud-hypervisor-cvm (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
38.0.72.2-5
Unknown None
CBL Mariner 2.0 x64 cloud-hypervisor-cvm (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
38.0.72.2-5
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-12797 None

CVE-2024-9143 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9143
MITRE
NVD

Issuing CNA: openssl-security@openssl.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11/28/2024    

Information published.


1.1    03/14/2025    

Added openssl to Azure Linux 3.0 Added hvloader to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9143
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM openssl (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.3.3-1
Unknown None
Azure Linux 3.0 x64 openssl (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.3.3-1
Unknown None
CBL Mariner 2.0 ARM hvloader (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1.0.1-6
Unknown None
CBL Mariner 2.0 x64 hvloader (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1.0.1-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9143 None

CVE-2024-37891 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-37891
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07/10/2024    

Information published.


1.1    08/29/2024    

Information published.


1.2    08/30/2024    

Information published.


1.3    08/31/2024    

Information published.


1.4    09/01/2024    

Information published.


1.5    09/02/2024    

Information published.


1.6    09/03/2024    

Information published.


1.7    09/05/2024    

Information published.


1.8    09/06/2024    

Information published.


1.9    09/07/2024    

Information published.


2.0    09/08/2024    

Information published.


2.1    09/11/2024    

Information published.


2.2    11/27/2024    

Added python-pip to Azure Linux 3.0 Added python-urllib3 to Azure Linux 3.0 Added python-urllib3 to CBL-Mariner 2.0


2.3    03/14/2025    

Added python3 to Azure Linux 3.0 Added python-pip to Azure Linux 3.0 Added python-urllib3 to Azure Linux 3.0 Added python-urllib3 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-37891
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-pip (CBL-Mariner)
python-urllib3 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
24.2-2

2.0.7-1
3.12.9-1
None
Azure Linux 3.0 x64 python-pip (CBL-Mariner)
python-urllib3 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
24.2-2

2.0.7-1
3.12.9-1
None
CBL Mariner 2.0 ARM python-urllib3 (CBL-Mariner) Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1.26.19-1
Unknown None
CBL Mariner 2.0 x64 python-urllib3 (CBL-Mariner) Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1.26.19-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-37891 None

CVE-2024-4030 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4030
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4030
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.12.9-1
Unknown None
Azure Linux 3.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.12.9-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4030 None

CVE-2024-45491 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45491
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09/13/2024    

Information published.


1.1    10/15/2024    

Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


1.2    03/14/2025    

Added python3 to Azure Linux 3.0 Added expat to Azure Linux 3.0 Added expat to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45491
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1

3.12.9-1
None
Azure Linux 3.0 x64 expat (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1

3.12.9-1
None
CBL Mariner 2.0 ARM expat (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1
Unknown None
CBL Mariner 2.0 x64 expat (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.6.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45491 None

CVE-2023-44398 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-44398
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-44398
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM exiv2 (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.28.3-1
Unknown None
Azure Linux 3.0 x64 exiv2 (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.28.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-44398 None

CVE-2024-39695 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39695
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39695
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM exiv2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
0.28.3-1
Unknown None
Azure Linux 3.0 x64 exiv2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
0.28.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39695 None

CVE-2015-8126 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2015-8126
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2015-8126
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2015-8126 None

CVE-2015-8472 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2015-8472
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2015-8472
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2015-8472 None

CVE-2017-12652 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-12652
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-12652
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-12652 None

CVE-2023-25563 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-25563
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-25563
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None
Azure Linux 3.0 x64 gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-25563 None

CVE-2019-7317 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-7317
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-7317
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fltk (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1.3.8-1
Unknown None
Azure Linux 3.0 x64 fltk (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1.3.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-7317 None

CVE-2023-25565 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-25565
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-25565
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None
Azure Linux 3.0 x64 gssntlmssp (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.3.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-25565 None

CVE-2023-40305 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40305
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40305
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM indent (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.2.13-1
Unknown None
Azure Linux 3.0 x64 indent (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.2.13-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40305 None

CVE-2017-11550 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-11550
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-11550
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libid3tag (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.16.3-7
Unknown None
Azure Linux 3.0 x64 libid3tag (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.16.3-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-11550 None

CVE-2017-11551 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-11551
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-11551
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libid3tag (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.16.3-7
Unknown None
Azure Linux 3.0 x64 libid3tag (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.16.3-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-11551 None

CVE-2018-7263 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2018-7263
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2018-7263
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libmad (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.16.4-1
Unknown None
Azure Linux 3.0 x64 libmad (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.16.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2018-7263 None

CVE-2023-39976 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-39976
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-39976
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libqb (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.0.8-1
Unknown None
Azure Linux 3.0 x64 libqb (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.0.8-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-39976 None

CVE-2023-35789 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-35789
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-35789
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM librabbitmq (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.14.0-1
Unknown None
Azure Linux 3.0 x64 librabbitmq (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.14.0-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-35789 None

CVE-2022-43357 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-43357
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-43357
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libsass (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.6.6-1
Unknown None
Azure Linux 3.0 x64 libsass (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.6.6-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-43357 None

CVE-2022-26592 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-26592
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12/27/2023    

Information published.


1.1    03/14/2025    

Added libsass to Azure Linux 3.0 Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-26592
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libsass (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
3.6.6-1
Unknown None
Azure Linux 3.0 x64 libsass (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
3.6.6-1
Unknown None
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
3.1.1-9
Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
3.1.1-9
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-26592 None

CVE-2022-43358 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-43358
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-43358
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libsass (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.6.6-1
Unknown None
Azure Linux 3.0 x64 libsass (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.6.6-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-43358 None

CVE-2023-28370 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-28370
MITRE
NVD

Issuing CNA: vultures@jpcert.or.jp

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-28370
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-tornado (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.3.3-11
Unknown None
Azure Linux 3.0 x64 python-tornado (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.3.3-11
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-28370 None

CVE-2022-24761 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-24761
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-24761
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-waitress (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.0.1-1
Unknown None
Azure Linux 3.0 x64 python-waitress (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.0.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-24761 None

CVE-2022-31015 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-31015
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-31015
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-waitress (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.1-1
Unknown None
Azure Linux 3.0 x64 python-waitress (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-31015 None

CVE-2018-25032 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2018-25032
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    03/31/2022    

Information published.


1.1    09/17/2022    

Added mariadb to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


1.2    04/17/2023    

Added tcl to CBL-Mariner 1.0


1.3    04/18/2023    

Added boost to CBL-Mariner 2.0


1.4    04/19/2023    

Added nmap to CBL-Mariner 2.0 Added tcl to CBL-Mariner 2.0


1.5    06/30/2024    

Information published.


1.6    07/13/2024    

Information published.


1.7    08/29/2024    

Information published.


1.8    08/30/2024    

Information published.


1.9    08/31/2024    

Information published.


2.0    09/01/2024    

Information published.


2.1    09/02/2024    

Information published.


2.2    09/03/2024    

Information published.


2.3    09/05/2024    

Information published.


2.4    09/06/2024    

Information published.


2.5    09/07/2024    

Information published.


2.6    09/08/2024    

Information published.


2.7    09/11/2024    

Information published.


2.8    03/14/2025    

Added teckit to Azure Linux 3.0 Added cloud-hypervisor-cvm to Azure Linux 3.0 Added grpc to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added cloud-hypervisor-cvm to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added qt5-qtbase to CBL-Mariner 2.0 Added boost to CBL-Mariner 2.0 Added nmap to CBL-Mariner 2.0 Added tcl to CBL-Mariner 2.0 Added zlib to CBL-Mariner 2.0 Added nmap to CBL-Mariner 1.0 Added boost to CBL-Mariner 1.0 Added erlang to CBL-Mariner 1.0 Added tcl to CBL-Mariner 1.0 Added zlib to CBL-Mariner 1.0 Added mariadb to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2018-25032
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cloud-hypervisor-cvm (CBL-Mariner)
cmake (CBL-Mariner)
grpc (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
38.0.72.2-1

3.28.2-1
1.62.0-2
2.5.12-4
None
Azure Linux 3.0 x64 cloud-hypervisor-cvm (CBL-Mariner)
cmake (CBL-Mariner)
grpc (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
38.0.72.2-1

3.28.2-1
1.62.0-2
2.5.12-4
None
CBL Mariner 1.0 ARM boost (CBL-Mariner)
erlang (CBL-Mariner)
mariadb (CBL-Mariner)
nmap (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.66.0-4

24.2-2
10.3.36-1
7.90-4
None
CBL Mariner 1.0 x64 boost (CBL-Mariner)
erlang (CBL-Mariner)
mariadb (CBL-Mariner)
nmap (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.66.0-4

24.2-2
10.3.36-1
7.90-4
None
CBL Mariner 2.0 ARM boost (CBL-Mariner)
cloud-hypervisor-cvm (CBL-Mariner)
nmap (CBL-Mariner)
qt5-qtbase (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.76.0-3

38.0.72.2-1
7.93-1
5.15.9-1
None
CBL Mariner 2.0 x64 boost (CBL-Mariner)
cloud-hypervisor-cvm (CBL-Mariner)
nmap (CBL-Mariner)
qt5-qtbase (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.76.0-3

38.0.72.2-1
7.93-1
5.15.9-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2018-25032 None

CVE-2022-37434 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-37434
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08/12/2022    

Information published.


1.1    06/30/2024    

Information published.


1.2    08/29/2024    

Information published.


1.3    08/30/2024    

Information published.


1.4    08/31/2024    

Information published.


1.5    09/01/2024    

Information published.


1.6    09/02/2024    

Information published.


1.7    09/03/2024    

Information published.


1.8    09/05/2024    

Information published.


1.9    09/06/2024    

Information published.


2.0    09/07/2024    

Information published.


2.1    09/08/2024    

Information published.


2.2    09/11/2024    

Information published.


2.3    03/14/2025    

Added teckit to Azure Linux 3.0 Added cloud-hypervisor-cvm to Azure Linux 3.0 Added crash to Azure Linux 3.0 Added zlib to CBL-Mariner 1.0 Added zlib to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-37434
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cloud-hypervisor-cvm (CBL-Mariner)
crash (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
38.0.72.2-1

8.0.4-2
2.5.12-4
None
Azure Linux 3.0 x64 cloud-hypervisor-cvm (CBL-Mariner)
crash (CBL-Mariner)
teckit (CBL-Mariner)
Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
38.0.72.2-1

8.0.4-2
2.5.12-4
None
CBL Mariner 1.0 ARM zlib (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.2.12-2
Unknown None
CBL Mariner 1.0 x64 zlib (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.2.12-2
Unknown None
CBL Mariner 2.0 ARM zlib (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.2.12-2
Unknown None
CBL Mariner 2.0 x64 zlib (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.2.12-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-37434 None

CVE-2024-34402 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-34402
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
Weakness: N/A
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    03/14/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-34402
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM uriparser (CBL-Mariner) Unknown Unknown Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
0.9.8-3
Unknown None
Azure Linux 3.0 x64 uriparser (CBL-Mariner) Unknown Unknown Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
0.9.8-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-34402 None

CVE-2025-24035 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24035
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
Weakness: CWE-591 : Sensitive Data Storage in Improperly Locked Memory
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24035
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24035 ʌ!ɔ⊥ojv with Kunlun Lab


Anonymous


Anonymous


CVE-2024-9157 - Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9157
MITRE
NVD

Issuing CNA: Synaptics, Inc.

CVE Title: Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:
None
FAQ:

Why is this Synaptics CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is Synaptics' Audio Effects component, which is consumed by Microsoft Windows. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: N/A
Temporal: N/A
Vector: N/A

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: N/A
Temporal: N/A
Vector: N/A

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: N/A
Temporal: N/A
Vector: N/A
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9157 Harrison Neal with PatchAdvisor


CVE-2025-24044 - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24044
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24044
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24044 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-24043 - WinDbg Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24043
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: WinDbg Remote Code Execution Vulnerability
Weakness: CWE-347 : Improper Verification of Cryptographic Signature
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24043
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
WinDbg Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2502.25002.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24043

CVE-2025-24057 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24057
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24057
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002693 (Security Update) Critical Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2016 (64-bit edition) 5002693 (Security Update) Critical Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24057 0x140ce(Peace & Love)


CVE-2025-24070 - ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24070
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
Weakness: CWE-1390 : Weak Authentication
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24070
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
ASP.NET Core 8.0 5054229 (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
8.0.14
Maybe None
ASP.NET Core 9.0 5054230 (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
9.0.3
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.10.12
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.12.6
Maybe None
Microsoft Visual Studio 2022 version 17.13 Release Notes (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.13.3
Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.8.19
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24070 Zahid TOKAT


CVE-2025-24077 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24077
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24077 Haifei Li with EXPMON


CVE-2025-24078 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24078
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Word 2016 (32-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None
Microsoft Word 2016 (64-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24078 Haifei Li with EXPMON


CVE-2025-24079 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24079
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24079
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Word 2016 (32-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None
Microsoft Word 2016 (64-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24079 Haifei Li with EXPMON


CVE-2025-24080 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24080
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2016 (64-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24080 Haifei Li with EXPMON


CVE-2025-24081 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24081
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24081
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002696 (Security Update)
5002694 (Security Update)
Important Remote Code Execution 5002687

5002684
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002696 (Security Update)
5002694 (Security Update)
Important Remote Code Execution 5002687

5002684
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Office Online Server 5002690 (Security Update) Important Remote Code Execution 5002679
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20073
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24081 Anonymous


CVE-2025-24082 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24082
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24082
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Office Online Server 5002690 (Security Update) Important Remote Code Execution 5002679
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20073
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24082 f4


CVE-2025-24083 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24083
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
Weakness: CWE-822 : Untrusted Pointer Dereference
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2016 (64-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24083 0x140ce(Peace & Love)


Exodus Intelligence Vendor Disclosure Team with Exodus Intelligence


Exodus Intelligence Vendor Disclosure Team with Exodus Intelligence


CVE-2025-24986 - Azure Promptflow Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24986
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Promptflow Remote Code Execution Vulnerability
Weakness: CWE-653 : Improper Isolation or Compartmentalization
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, Confidentiality and Integrity are rated as Low and Availability is None (C:L, I:L, A:N). What does that mean for this vulnerability?

While an attacker can access some data, that data is not customer’s data, or any highly sensitive/critical information; furthermore an attacker cannot affect the availability of the product.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24986
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure promptflow-core Release Notes (Security Update) Important Remote Code Execution Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
1.17.2
No None
Azure promptflow-tools Release Notes (Security Update) Important Remote Code Execution Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
1.6.0
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24986 l1k3beef


CVE-2025-24987 - Windows USB Video Class System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24987
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Weakness: CWE-125 : Out-of-bounds Read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24987
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24987 Adel and Benjamin Rodes


CVE-2025-24988 - Windows USB Video Class System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24988
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Weakness: CWE-125 : Out-of-bounds Read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24988
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24988 Adel and Benjamin Rodes.


CVE-2025-21180 - Windows exFAT File System Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21180
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows exFAT File System Remote Code Execution Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21180 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-24995 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24995
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24995
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24995 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24996 - NTLM Hash Disclosure Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24996
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
Weakness: CWE-73 : External Control of File Name or Path
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24996
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Spoofing 5051980
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24996 Aakriti Shukla with Microsoft


CVE-2025-24997 - DirectX Graphics Kernel File Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24997
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel File Denial of Service Vulnerability
Weakness: CWE-476 : NULL Pointer Dereference
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Kernel Memory allows an authorized attacker to deny service locally.


FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24997
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Denial of Service 5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Denial of Service 5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Denial of Service 5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Denial of Service
5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Denial of Service
5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Denial of Service
5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Denial of Service 5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Denial of Service 5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Denial of Service
5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Denial of Service
5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Denial of Service 5051979

5052106
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Denial of Service 5051979

5052106
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Denial of Service 5051980
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24997

CVE-2025-24998 - Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24998
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Elevation of Privilege Vulnerability
Weakness: CWE-427 : Uncontrolled Search Path Element
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


According to the CVSS metric, the attack vector is local (AV:L), privileges are low (PR:L), and user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an authenticated attacker to place a specially crafted .dll file in a local network location. When a victim runs this file, it loads the malicious DLL.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24998
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.9.71
Maybe None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.45
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.12
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.12.6
Maybe None
Microsoft Visual Studio 2022 version 17.13 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.13.3
Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.19
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24998 Polar Penguin


CVE-2025-25003 - Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25003
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Elevation of Privilege Vulnerability
Weakness: CWE-427 : Uncontrolled Search Path Element
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires that a user trigger the payload in the application.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25003
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.45
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.12
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.12.6
Maybe None
Microsoft Visual Studio 2022 version 17.13 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.13.3
Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.19
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25003 ycdxsb


CVE-2025-25008 - Windows Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25008
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Server Elevation of Privilege Vulnerability
Weakness: CWE-59 : Improper Link Resolution Before File Access ('Link Following')
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would be able to delete targeted files on a system.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?

This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25008
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update) Important Elevation of Privilege 5051979
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update) Important Elevation of Privilege 5051979
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update) Important Elevation of Privilege 5051987
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update) Important Elevation of Privilege 5051987
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25008 Lockheed Martin Red Team


CVE-2025-1919 - Chromium: CVE-2025-1919 Out of bounds read in Media

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1919
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1919 Out of bounds read in Media
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1919
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1919 None

CVE-2025-1916 - Chromium: CVE-2025-1916 Use after free in Profiles

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1916
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1916 Use after free in Profiles
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1916
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1916 None

CVE-2025-1918 - Chromium: CVE-2025-1918 Out of bounds read in PDFium

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1918
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1918 Out of bounds read in PDFium
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1918
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1918 None

CVE-2025-1917 - Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1917
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1917
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1917 None

CVE-2025-1921 - Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1921
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1921
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1921 None

CVE-2025-1915 - Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1915
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1915
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1915 None

CVE-2025-1923 - Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1923
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1923
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1923 None

CVE-2025-1922 - Chromium: CVE-2025-1922 Inappropriate Implementation in Selection

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1922
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1922
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1922 None

CVE-2025-1914 - Chromium: CVE-2025-1914 Out of bounds read in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1914
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1914 Out of bounds read in V8
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1914
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1914 None

CVE-2025-2135 - Chromium: CVE-2025-2135 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-2135
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-2135 Type Confusion in V8
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.62 3/12//2025 134.0.6998.89

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-2135
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.62
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-2135 None

CVE-2025-1920 - Chromium: CVE-2025-1920 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1920
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1920 Type Confusion in V8
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.62 3/12//2025 134.0.6998.89

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1920
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.62
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1920 None

CVE-2025-21247 - MapUrlToZone Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21247
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: MapUrlToZone Security Feature Bypass Vulnerability
Weakness: CWE-41 : Improper Resolution of Path Equivalence
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21247
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
5053593 (IE Cumulative)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168

1.000
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
5053593 (IE Cumulative)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053593 (IE Cumulative)
5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass
5052016
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053593 (IE Cumulative)
5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass
5052016
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053593 (IE Cumulative)
5053887 (Monthly Rollup)
Important Security Feature Bypass
5052042
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053593 (IE Cumulative)
5053887 (Monthly Rollup)
Important Security Feature Bypass
5052042
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Security Feature Bypass 5051980
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21247 George Hughey with MSRC Vulnerabilities & Mitigations


George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-21199 - Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21199
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
Weakness: CWE-269 : Improper Privilege Management
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an administrator to install the VM agent on the target device where an attacker has planted specially crafted malicious files.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What are the fixed build numbers for the versions of Azure Site Recovery addressed in Update Rollup 76 for Azure Site Recovery?

Component Name Version
ASR V2A Agent (Classic VMware/Physical to Azure) 9.63.7233.1
ASR H2A Agent (Hyper-V or VMM to Azure) 5.1.8116.0
ASR Mars 2.0.9940.0

**Are there any any prerequisites for installing the update?

To install Microsoft Azure Site Recovery Provider Update Rollup 76, you must have one of the following installed:

  • Microsoft Azure Site Recovery Provider (version 5.23.x or a later version)
  • Microsoft Azure Recovery Services Agent (version 2.0.9263.0 or a later version)

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21199
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Agent for Backup Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.9940.0
Maybe None
Azure Agent for Site Recovery Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
9.30
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21199 R4nger & Zhiniang Peng


CVE-2025-24045 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24045
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
Weakness: CWE-591 : Sensitive Data Storage in Improperly Locked Memory
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24045
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24045 ʌ!ɔ⊥ojv with Kunlun Lab


Ashana Sharan with Microsoft India


CVE-2025-24046 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24046
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24046
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24046 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24048 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24048
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
Weakness: CWE-122 CWE-125 : Heap-based Buffer Overflow Out-of-bounds Read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24048
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24048 ChengBin Wang with ZheJiang Guoli Security Technology


CVE-2025-24050 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24050
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
Weakness: CWE-122 CWE-125 : Heap-based Buffer Overflow Out-of-bounds Read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24050
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24050 ChengBin Wang with ZheJiang Guoli Security Technology


CVE-2025-24051 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24051
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24051 Anonymous


CVE-2025-24054 - NTLM Hash Disclosure Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24054
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
Weakness: CWE-73 : External Control of File Name or Path
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24054
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Spoofing 5051980
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24054 Rintaro Koike with NTT Security Holdings


j00sean


CVE-2025-24055 - Windows USB Video Class System Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24055
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Information Disclosure Vulnerability
Weakness: CWE-125 : Out-of-bounds Read
Customer Action Required: No
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24055
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24055 Adel from MSRC V&M


CVE-2025-24056 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24056
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24056
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24056 Anonymous


CVE-2025-24059 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24059
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
Weakness: CWE-681 CWE-125 : Incorrect Conversion between Numeric Types Out-of-bounds Read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24059
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24059 Anonymous


CVE-2025-24061 - Windows Mark of the Web Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24061
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
Weakness: CWE-693 : Protection Mechanism Failure
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.


FAQ:

How could an attacker exploit the vulnerability?

  • In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass.
  • In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass.
  • Compromised websites or websites that accept or host user-provided content could contain specially crafted content to exploit the security feature bypass.

In all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment.

Please see Additional information about Mark of the Web for further clarification


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited the vulnerability could evade Mark of the Web (MOTW) defenses.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24061
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Security Feature Bypass 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24061 SkorikARI with SkorikARI


CVE-2025-24064 - Windows Domain Name Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24064
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Domain Name Service Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in DNS Server allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

In a network-based attack an attacker sending a dynamic DNS update message with perfect timing to a DNS server could potentially execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24064
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24064 Jay Ladhad with Microsoft


CVE-2025-24066 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24066
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24066
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24066 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24067 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24067
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24067
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24067 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24071
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
Weakness: CWE-200 : Exposure of Sensitive Information to an Unauthorized Actor
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24071
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Spoofing 5051980
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24071 SkorikARI with SkorikARI


Wayne Low of Synapxe


CVE-2025-24072 - Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24072
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24072 Florian Schweins


CVE-2025-24075 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24075
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
Weakness: CWE-121 : Stack-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Office Online Server 5002690 (Security Update) Important Remote Code Execution 5002679
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20073
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24075 Li Shuang and willJ with Vulnerability Research Institute


CVE-2025-24076 - Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24076
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
Weakness: CWE-284 : Improper Access Control
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option).


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24076
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24076 John Ostrowski with Compass Security


CVE-2025-24084 - Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24084
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
Weakness: CWE-822 : Untrusted Pointer Dereference
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.


FAQ:

How could an attacker exploit this vulnerability?

Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message. In the worst-case email attack scenario, an attacker could send a specially crafted email to the user without a requirement that the victim open, read, or click on the link. This could result in the attacker executing remote code on the victim's machine. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk (UI:N).


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24084

CVE-2025-24983 - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24983
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24983
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24983 Filip Jurčacko with ESET


CVE-2025-24984 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24984
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
Weakness: CWE-532 : Insertion of Sensitive Information into Log File
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.


FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24984
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24984 Anonymous


CVE-2025-24985 - Windows Fast FAT File System Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24985
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Fast FAT File System Driver Remote Code Execution Vulnerability
Weakness: CWE-190 CWE-122 : Integer Overflow or Wraparound Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24985
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24985 Anonymous


CVE-2025-24991 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24991
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
Weakness: CWE-125 : Out-of-bounds Read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24991
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24991 Anonymous


CVE-2025-24992 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24992
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
Weakness: CWE-126 : Buffer Over-read
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24992
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24992 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-24993 - Windows NTFS Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24993
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Remote Code Execution Vulnerability
Weakness: CWE-122 : Heap-based Buffer Overflow
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24993
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24993 Anonymous


CVE-2025-24994 - Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24994
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
Weakness: CWE-284 : Improper Access Control
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option).


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24994
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24994 John Ostrowski with Compass Security


CVE-2025-24049 - Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24049
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
Weakness: CWE-77 : Improper Neutralization of Special Elements used in a Command ('Command Injection')
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by passing a specially crafted key-value argument to Azure CLI, injecting arbitrary Python code that modifies runtime behavior.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24049
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure CLI Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.69.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24049 Zhengyu Liu and Jiacheng(Gavin) Zhong with Johns Hopkins University


Zhengyu Liu with Johns Hopkins University


Jiacheng(Gavin) Zhong with Johns Hopkins University


CVE-2025-26627 - Azure Arc Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26627
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Arc Installer Elevation of Privilege Vulnerability
Weakness: CWE-77 : Improper Neutralization of Special Elements used in a Command ('Command Injection')
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How do I know if I'm affected by this vulnerability?

Only machines onboarded via Group Policy that have the GPO applied to them are affected.

The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589'

What steps are needed to protect from this vulnerability?

  1. Unassign and delete the previous Group Policy Object from the Group Policy Management Console (GPMC).
  2. Download the new scripts from the Fixed agent proxy parameter release in the Github repository 1.0.10.
  3. Run the DeployGPO script as before using the same parameters.
  4. Assign the new Group Policy Object to your groups/domains/units.

For further information, please go to the Arc blade of Azure Portal and follow the instructions for GPO onboarding.

Only machines onboarded via Group Policy that have the GPO applied to them are affected

The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589'


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to carefully time their actions to exploit the timing differences in the execution of specific operations. They must accurately measure these timing variations to infer sensitive information or gain unauthorized access. This often involves sophisticated techniques to manipulate and observe the timing behavior of the target system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26627
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure ARC What's new (Security Update) Important Elevation of Privilege Base: 7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.0.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26627 SP with WithSecure Consulting


CVE-2025-26629 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26629
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26629
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26629 Haifei Li with EXPMON


CVE-2025-26630 - Microsoft Access Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26630
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Access Remote Code Execution Vulnerability
Weakness: CWE-416 : Use After Free
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user needs to be tricked into running malicious files.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26630
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Access 2016 (32-bit edition) 5002697 (Security Update) Important Remote Code Execution 5002670
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Access 2016 (64-bit edition) 5002697 (Security Update) Important Remote Code Execution 5002670
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26630 Unpatched.ai


CVE-2025-26631 - Visual Studio Code Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26631
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Code Elevation of Privilege Vulnerability
Weakness: CWE-427 : Uncontrolled Search Path Element
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26631
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Visual Studio Code Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.98.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26631 Sandro Poppi


CVE-2025-26633 - Microsoft Management Console Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26633
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Management Console Security Feature Bypass Vulnerability
Weakness: CWE-707 : Improper Neutralization
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:7/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


How could an attacker exploit the vulnerability?

In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the vulnerability.

In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26633
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass 5052016
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass 5052016
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Security Feature Bypass 5052042
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Security Feature Bypass 5052042
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Security Feature Bypass 5051980
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26633 Aliakbar Zahravi with Trend Micro


CVE-2025-26643 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26643
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
Weakness: CWE-449 : The UI Performs the Wrong Action
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

The UI performs the wrong action in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L), and availability (A:N). What does that mean for this vulnerability?

Successful exploitation of this vulnerability has limited impacts to Confidentiality and Integrity and no impact on Availability. An attacker would need to combine this vulnerability with other vulnerabilities to perform an attack.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the permissions dialog feature prompt presented to users when initiating a download.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/07/2025    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26643
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Low Spoofing Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26643 Farras Givari with Meta4sec


Ahmed ElMasry


Om Apip with ITSEC Asia


canalun


CVE-2025-26645 - Remote Desktop Client Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26645
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
Weakness: CWE-23 CWE-284 : Relative Path Traversal Improper Access Control
Customer Action Required: Yes
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/11/2025    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26645
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Remote Desktop client for Windows Desktop Release Notes (Security Update) Critical Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2.6017.0
Maybe None
Windows 10 for 32-bit Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows App Client for Windows Desktop Release Notes (Security Update) Critical Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.365.0
Maybe None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update) Critical Remote Code Execution 5051979
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update) Critical Remote Code Execution 5051979
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26645 None

CVE-2025-2137 - Chromium: CVE-2025-2137 Out of bounds read in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-2137
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-2137 Out of bounds read in V8
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.62 3/12//2025 134.0.6998.89

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-2137
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.62
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-2137 None

CVE-2025-2136 - Chromium: CVE-2025-2136 Use after free in Inspector

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-2136
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-2136 Use after free in Inspector
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.62 3/12//2025 134.0.6998.89

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-2136
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.62
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-2136 None

CVE-2025-24201 - Chromium: CVE-2025-24201 Out of bounds write in GPU on Mac

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24201
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-24201 Out of bounds write in GPU on Mac
Weakness: N/A
Customer Action Required: Yes
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

Google is aware of reports that an exploit for CVE-2025-24201 exists in the wild.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.62 3/12//2025 134.0.6998.89

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    03/12/2025    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24201
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.62
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24201 None

CVE-2025-24053 - Microsoft Dataverse Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24053
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dataverse Elevation of Privilege Vulnerability
Weakness: CWE-285 : Improper Authorization
Customer Action Required: No
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03/13/2025    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment for this vulnerability at the time of original publication.

Exploitability Assessment Publicly Disclosed Exploited
N/A No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24053
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dataverse Critical Elevation of Privilege None Base: 7.2
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24053 Erik Donker with Microsoft